mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			2352 lines
		
	
	
		
			86 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			2352 lines
		
	
	
		
			86 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2015 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package v1_test
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"reflect"
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"github.com/google/go-cmp/cmp"
 | 
						|
	v1 "k8s.io/api/core/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/runtime"
 | 
						|
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						|
	"k8s.io/apimachinery/pkg/util/version"
 | 
						|
	utilfeature "k8s.io/apiserver/pkg/util/feature"
 | 
						|
	featuregatetesting "k8s.io/component-base/featuregate/testing"
 | 
						|
	"k8s.io/kubernetes/pkg/api/legacyscheme"
 | 
						|
	corev1 "k8s.io/kubernetes/pkg/apis/core/v1"
 | 
						|
	"k8s.io/kubernetes/pkg/features"
 | 
						|
	utilpointer "k8s.io/utils/pointer"
 | 
						|
 | 
						|
	// ensure types are installed
 | 
						|
	_ "k8s.io/kubernetes/pkg/apis/core/install"
 | 
						|
)
 | 
						|
 | 
						|
// TestWorkloadDefaults detects changes to defaults within PodTemplateSpec.
 | 
						|
// Defaulting changes within this type can cause spurious rollouts of workloads on API server update.
 | 
						|
func TestWorkloadDefaults(t *testing.T) {
 | 
						|
	t.Run("enabled_features", func(t *testing.T) { testWorkloadDefaults(t, true) })
 | 
						|
	t.Run("disabled_features", func(t *testing.T) { testWorkloadDefaults(t, false) })
 | 
						|
}
 | 
						|
func testWorkloadDefaults(t *testing.T, featuresEnabled bool) {
 | 
						|
	allFeatures := utilfeature.DefaultFeatureGate.DeepCopy().GetAll()
 | 
						|
	for feature, featureSpec := range allFeatures {
 | 
						|
		if !featureSpec.LockToDefault {
 | 
						|
			featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, feature, featuresEnabled)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	// New defaults under PodTemplateSpec are only acceptable if they would not be applied when reading data from a previous release.
 | 
						|
	// Forbidden: adding a new field `MyField *bool` and defaulting it to a non-nil value
 | 
						|
	// Forbidden: defaulting an existing field `MyField *bool` when it was previously not defaulted
 | 
						|
	// Forbidden: changing an existing default value
 | 
						|
	// Allowed: adding a new field `MyContainer *MyType` and defaulting a child of that type (e.g. `MyContainer.MyChildField`) if and only if MyContainer is non-nil
 | 
						|
	expectedDefaults := map[string]string{
 | 
						|
		".Spec.Containers[0].Env[0].ValueFrom.FieldRef.APIVersion":       `"v1"`,
 | 
						|
		".Spec.Containers[0].ImagePullPolicy":                            `"IfNotPresent"`,
 | 
						|
		".Spec.Containers[0].Lifecycle.PostStart.HTTPGet.Path":           `"/"`,
 | 
						|
		".Spec.Containers[0].Lifecycle.PostStart.HTTPGet.Scheme":         `"HTTP"`,
 | 
						|
		".Spec.Containers[0].Lifecycle.PreStop.HTTPGet.Path":             `"/"`,
 | 
						|
		".Spec.Containers[0].Lifecycle.PreStop.HTTPGet.Scheme":           `"HTTP"`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.FailureThreshold":             `3`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.ProbeHandler.HTTPGet.Path":    `"/"`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.ProbeHandler.HTTPGet.Scheme":  `"HTTP"`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.PeriodSeconds":                `10`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.SuccessThreshold":             `1`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.TimeoutSeconds":               `1`,
 | 
						|
		".Spec.Containers[0].Ports[0].Protocol":                          `"TCP"`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.FailureThreshold":            `3`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.ProbeHandler.HTTPGet.Path":   `"/"`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.ProbeHandler.HTTPGet.Scheme": `"HTTP"`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.PeriodSeconds":               `10`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.SuccessThreshold":            `1`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.TimeoutSeconds":              `1`,
 | 
						|
		".Spec.Containers[0].StartupProbe.FailureThreshold":              "3",
 | 
						|
		".Spec.Containers[0].StartupProbe.ProbeHandler.HTTPGet.Path":     `"/"`,
 | 
						|
		".Spec.Containers[0].StartupProbe.ProbeHandler.HTTPGet.Scheme":   `"HTTP"`,
 | 
						|
		".Spec.Containers[0].StartupProbe.PeriodSeconds":                 "10",
 | 
						|
		".Spec.Containers[0].StartupProbe.SuccessThreshold":              "1",
 | 
						|
		".Spec.Containers[0].StartupProbe.TimeoutSeconds":                "1",
 | 
						|
		".Spec.Containers[0].TerminationMessagePath":                     `"/dev/termination-log"`,
 | 
						|
		".Spec.Containers[0].TerminationMessagePolicy":                   `"File"`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.ProbeHandler.GRPC.Service":    `""`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.ProbeHandler.GRPC.Service":   `""`,
 | 
						|
		".Spec.Containers[0].StartupProbe.ProbeHandler.GRPC.Service":     `""`,
 | 
						|
		".Spec.DNSPolicy": `"ClusterFirst"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.ProbeHandler.HTTPGet.Path":    `"/"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.ProbeHandler.HTTPGet.Scheme":  `"HTTP"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.ProbeHandler.HTTPGet.Path":   `"/"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.ProbeHandler.HTTPGet.Scheme": `"HTTP"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.ProbeHandler.HTTPGet.Path":     `"/"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.ProbeHandler.HTTPGet.Scheme":   `"HTTP"`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.ProbeHandler.HTTPGet.Path":                                  `"/"`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.ProbeHandler.HTTPGet.Scheme":                                `"HTTP"`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.ProbeHandler.HTTPGet.Path":                                 `"/"`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.ProbeHandler.HTTPGet.Scheme":                               `"HTTP"`,
 | 
						|
		".Spec.InitContainers[0].StartupProbe.ProbeHandler.HTTPGet.Path":                                   `"/"`,
 | 
						|
		".Spec.InitContainers[0].StartupProbe.ProbeHandler.HTTPGet.Scheme":                                 `"HTTP"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Env[0].ValueFrom.FieldRef.APIVersion":       `"v1"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ImagePullPolicy":                            `"IfNotPresent"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Lifecycle.PostStart.HTTPGet.Path":           `"/"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Lifecycle.PostStart.HTTPGet.Scheme":         `"HTTP"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Lifecycle.PreStop.HTTPGet.Path":             `"/"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Lifecycle.PreStop.HTTPGet.Scheme":           `"HTTP"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.FailureThreshold":             "3",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.ProbeHandler.GRPC.Service":    `""`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.PeriodSeconds":                "10",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.SuccessThreshold":             "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.TimeoutSeconds":               "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Ports[0].Protocol":                          `"TCP"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.FailureThreshold":            "3",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.ProbeHandler.GRPC.Service":   `""`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.PeriodSeconds":               "10",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.SuccessThreshold":            "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.TimeoutSeconds":              "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.FailureThreshold":              "3",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.ProbeHandler.GRPC.Service":     `""`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.PeriodSeconds":                 "10",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.SuccessThreshold":              "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.TimeoutSeconds":                "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.TerminationMessagePath":                     `"/dev/termination-log"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.TerminationMessagePolicy":                   `"File"`,
 | 
						|
		".Spec.InitContainers[0].Env[0].ValueFrom.FieldRef.APIVersion":                                     `"v1"`,
 | 
						|
		".Spec.InitContainers[0].ImagePullPolicy":                                                          `"IfNotPresent"`,
 | 
						|
		".Spec.InitContainers[0].Lifecycle.PostStart.HTTPGet.Path":                                         `"/"`,
 | 
						|
		".Spec.InitContainers[0].Lifecycle.PostStart.HTTPGet.Scheme":                                       `"HTTP"`,
 | 
						|
		".Spec.InitContainers[0].Lifecycle.PreStop.HTTPGet.Path":                                           `"/"`,
 | 
						|
		".Spec.InitContainers[0].Lifecycle.PreStop.HTTPGet.Scheme":                                         `"HTTP"`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.FailureThreshold":                                           `3`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.ProbeHandler.GRPC.Service":                                  `""`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.PeriodSeconds":                                              `10`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.SuccessThreshold":                                           `1`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.TimeoutSeconds":                                             `1`,
 | 
						|
		".Spec.InitContainers[0].Ports[0].Protocol":                                                        `"TCP"`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.FailureThreshold":                                          `3`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.ProbeHandler.GRPC.Service":                                 `""`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.PeriodSeconds":                                             `10`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.SuccessThreshold":                                          `1`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.TimeoutSeconds":                                            `1`,
 | 
						|
		".Spec.InitContainers[0].StartupProbe.FailureThreshold":                                            "3",
 | 
						|
		".Spec.InitContainers[0].StartupProbe.ProbeHandler.GRPC.Service":                                   `""`,
 | 
						|
		".Spec.InitContainers[0].StartupProbe.PeriodSeconds":                                               "10",
 | 
						|
		".Spec.InitContainers[0].StartupProbe.SuccessThreshold":                                            "1",
 | 
						|
		".Spec.InitContainers[0].StartupProbe.TimeoutSeconds":                                              "1",
 | 
						|
		".Spec.InitContainers[0].TerminationMessagePath":                                                   `"/dev/termination-log"`,
 | 
						|
		".Spec.InitContainers[0].TerminationMessagePolicy":                                                 `"File"`,
 | 
						|
		".Spec.RestartPolicy":                                                                         `"Always"`,
 | 
						|
		".Spec.SchedulerName":                                                                         `"default-scheduler"`,
 | 
						|
		".Spec.SecurityContext":                                                                       `{}`,
 | 
						|
		".Spec.TerminationGracePeriodSeconds":                                                         `30`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.AzureDisk.CachingMode":                                         `"ReadWrite"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.AzureDisk.FSType":                                              `"ext4"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.AzureDisk.Kind":                                                `"Shared"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.AzureDisk.ReadOnly":                                            `false`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.ConfigMap.DefaultMode":                                         `420`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.DownwardAPI.DefaultMode":                                       `420`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.DownwardAPI.Items[0].FieldRef.APIVersion":                      `"v1"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.EmptyDir":                                                      `{}`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Ephemeral.VolumeClaimTemplate.Spec.VolumeMode":                 `"Filesystem"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.HostPath.Type":                                                 `""`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.ISCSI.ISCSIInterface":                                          `"default"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Image.PullPolicy":                                              `"IfNotPresent"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Projected.DefaultMode":                                         `420`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Projected.Sources[0].DownwardAPI.Items[0].FieldRef.APIVersion": `"v1"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Projected.Sources[0].ServiceAccountToken.ExpirationSeconds":    `3600`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.RBD.Keyring":                                                   `"/etc/ceph/keyring"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.RBD.RBDPool":                                                   `"rbd"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.RBD.RadosUser":                                                 `"admin"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.ScaleIO.FSType":                                                `"xfs"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.ScaleIO.StorageMode":                                           `"ThinProvisioned"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Secret.DefaultMode":                                            `420`,
 | 
						|
	}
 | 
						|
	if !featuresEnabled {
 | 
						|
		delete(expectedDefaults, ".Spec.Volumes[0].VolumeSource.Image.PullPolicy")
 | 
						|
	}
 | 
						|
	t.Run("empty PodTemplateSpec", func(t *testing.T) {
 | 
						|
		rc := &v1.ReplicationController{Spec: v1.ReplicationControllerSpec{Template: &v1.PodTemplateSpec{}}}
 | 
						|
		template := rc.Spec.Template
 | 
						|
		defaults := detectDefaults(t, rc, reflect.ValueOf(template))
 | 
						|
		if !reflect.DeepEqual(expectedDefaults, defaults) {
 | 
						|
			t.Errorf("Defaults for PodTemplateSpec changed. This can cause spurious rollouts of workloads on API server upgrade.")
 | 
						|
			t.Log(cmp.Diff(expectedDefaults, defaults))
 | 
						|
		}
 | 
						|
	})
 | 
						|
	t.Run("hostnet PodTemplateSpec with ports", func(t *testing.T) {
 | 
						|
		rc := &v1.ReplicationController{
 | 
						|
			Spec: v1.ReplicationControllerSpec{
 | 
						|
				Template: &v1.PodTemplateSpec{
 | 
						|
					Spec: v1.PodSpec{
 | 
						|
						HostNetwork: true,
 | 
						|
						Containers: []v1.Container{{
 | 
						|
							Ports: []v1.ContainerPort{{
 | 
						|
								ContainerPort: 12345,
 | 
						|
								Protocol:      v1.ProtocolTCP,
 | 
						|
							}},
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}
 | 
						|
		template := rc.Spec.Template
 | 
						|
		defaults := detectDefaults(t, rc, reflect.ValueOf(template))
 | 
						|
		expected := func() map[string]string {
 | 
						|
			// Set values that are known inputs
 | 
						|
			m := map[string]string{
 | 
						|
				".Spec.HostNetwork":                          "true",
 | 
						|
				".Spec.Containers[0].Ports[0].ContainerPort": "12345",
 | 
						|
			}
 | 
						|
			m[".Spec.Containers"] = `[{"name":"","ports":[{"containerPort":12345,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}]`
 | 
						|
			m[".Spec.Containers[0].Ports"] = `[{"containerPort":12345,"protocol":"TCP"}]`
 | 
						|
			for k, v := range expectedDefaults {
 | 
						|
				if _, found := m[k]; !found {
 | 
						|
					m[k] = v
 | 
						|
				}
 | 
						|
			}
 | 
						|
			return m
 | 
						|
		}()
 | 
						|
		if !reflect.DeepEqual(expected, defaults) {
 | 
						|
			t.Errorf("Defaults for PodTemplateSpec changed. This can cause spurious rollouts of workloads on API server upgrade.")
 | 
						|
			t.Log(cmp.Diff(expected, defaults))
 | 
						|
		}
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
// TestPodDefaults detects changes to defaults within PodSpec.
 | 
						|
// Defaulting changes within this type (*especially* within containers) can cause kubelets to restart containers on API server update.
 | 
						|
func TestPodDefaults(t *testing.T) {
 | 
						|
	t.Run("enabled_features", func(t *testing.T) { testPodDefaults(t, true) })
 | 
						|
	t.Run("disabled_features", func(t *testing.T) { testPodDefaults(t, false) })
 | 
						|
}
 | 
						|
func testPodDefaults(t *testing.T, featuresEnabled bool) {
 | 
						|
	features := utilfeature.DefaultFeatureGate.DeepCopy().GetAll()
 | 
						|
	for feature, featureSpec := range features {
 | 
						|
		if !featureSpec.LockToDefault {
 | 
						|
			featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, feature, featuresEnabled)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	pod := &v1.Pod{}
 | 
						|
	// New defaults under PodSpec are only acceptable if they would not be applied when reading data from a previous release.
 | 
						|
	// Forbidden: adding a new field `MyField *bool` and defaulting it to a non-nil value
 | 
						|
	// Forbidden: defaulting an existing field `MyField *bool` when it was previously not defaulted
 | 
						|
	// Forbidden: changing an existing default value
 | 
						|
	// Allowed: adding a new field `MyContainer *MyType` and defaulting a child of that type (e.g. `MyContainer.MyChildField`) if and only if MyContainer is non-nil
 | 
						|
	expectedDefaults := map[string]string{
 | 
						|
		".Spec.Containers[0].Env[0].ValueFrom.FieldRef.APIVersion":       `"v1"`,
 | 
						|
		".Spec.Containers[0].ImagePullPolicy":                            `"IfNotPresent"`,
 | 
						|
		".Spec.Containers[0].Lifecycle.PostStart.HTTPGet.Path":           `"/"`,
 | 
						|
		".Spec.Containers[0].Lifecycle.PostStart.HTTPGet.Scheme":         `"HTTP"`,
 | 
						|
		".Spec.Containers[0].Lifecycle.PreStop.HTTPGet.Path":             `"/"`,
 | 
						|
		".Spec.Containers[0].Lifecycle.PreStop.HTTPGet.Scheme":           `"HTTP"`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.FailureThreshold":             `3`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.ProbeHandler.HTTPGet.Path":    `"/"`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.ProbeHandler.HTTPGet.Scheme":  `"HTTP"`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.PeriodSeconds":                `10`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.SuccessThreshold":             `1`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.TimeoutSeconds":               `1`,
 | 
						|
		".Spec.Containers[0].Ports[0].Protocol":                          `"TCP"`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.FailureThreshold":            `3`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.ProbeHandler.HTTPGet.Path":   `"/"`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.ProbeHandler.HTTPGet.Scheme": `"HTTP"`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.PeriodSeconds":               `10`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.SuccessThreshold":            `1`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.TimeoutSeconds":              `1`,
 | 
						|
		".Spec.Containers[0].Resources.Requests":                         `{"":"0"}`, // this gets defaulted from the limits field
 | 
						|
		".Spec.Containers[0].StartupProbe.FailureThreshold":              "3",
 | 
						|
		".Spec.Containers[0].StartupProbe.ProbeHandler.HTTPGet.Path":     `"/"`,
 | 
						|
		".Spec.Containers[0].StartupProbe.ProbeHandler.HTTPGet.Scheme":   `"HTTP"`,
 | 
						|
		".Spec.Containers[0].StartupProbe.PeriodSeconds":                 "10",
 | 
						|
		".Spec.Containers[0].StartupProbe.SuccessThreshold":              "1",
 | 
						|
		".Spec.Containers[0].StartupProbe.TimeoutSeconds":                "1",
 | 
						|
		".Spec.Containers[0].TerminationMessagePath":                     `"/dev/termination-log"`,
 | 
						|
		".Spec.Containers[0].TerminationMessagePolicy":                   `"File"`,
 | 
						|
		".Spec.Containers[0].LivenessProbe.ProbeHandler.GRPC.Service":    `""`,
 | 
						|
		".Spec.Containers[0].ReadinessProbe.ProbeHandler.GRPC.Service":   `""`,
 | 
						|
		".Spec.Containers[0].StartupProbe.ProbeHandler.GRPC.Service":     `""`,
 | 
						|
		".Spec.DNSPolicy":          `"ClusterFirst"`,
 | 
						|
		".Spec.EnableServiceLinks": `true`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Env[0].ValueFrom.FieldRef.APIVersion":       `"v1"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ImagePullPolicy":                            `"IfNotPresent"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Lifecycle.PostStart.HTTPGet.Path":           `"/"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Lifecycle.PostStart.HTTPGet.Scheme":         `"HTTP"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Lifecycle.PreStop.HTTPGet.Path":             `"/"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Lifecycle.PreStop.HTTPGet.Scheme":           `"HTTP"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.FailureThreshold":             "3",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.PeriodSeconds":                "10",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.SuccessThreshold":             "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.TimeoutSeconds":               "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.Ports[0].Protocol":                          `"TCP"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.FailureThreshold":            "3",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.PeriodSeconds":               "10",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.SuccessThreshold":            "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.TimeoutSeconds":              "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.FailureThreshold":              "3",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.PeriodSeconds":                 "10",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.SuccessThreshold":              "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.TimeoutSeconds":                "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.TerminationMessagePath":                     `"/dev/termination-log"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.TerminationMessagePolicy":                   `"File"`,
 | 
						|
		".Spec.InitContainers[0].Env[0].ValueFrom.FieldRef.APIVersion":                                     `"v1"`,
 | 
						|
		".Spec.InitContainers[0].ImagePullPolicy":                                                          `"IfNotPresent"`,
 | 
						|
		".Spec.InitContainers[0].Lifecycle.PostStart.HTTPGet.Path":                                         `"/"`,
 | 
						|
		".Spec.InitContainers[0].Lifecycle.PostStart.HTTPGet.Scheme":                                       `"HTTP"`,
 | 
						|
		".Spec.InitContainers[0].Lifecycle.PreStop.HTTPGet.Path":                                           `"/"`,
 | 
						|
		".Spec.InitContainers[0].Lifecycle.PreStop.HTTPGet.Scheme":                                         `"HTTP"`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.FailureThreshold":                                           `3`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.PeriodSeconds":                                              `10`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.SuccessThreshold":                                           `1`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.TimeoutSeconds":                                             `1`,
 | 
						|
		".Spec.InitContainers[0].Ports[0].Protocol":                                                        `"TCP"`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.FailureThreshold":                                          `3`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.PeriodSeconds":                                             `10`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.SuccessThreshold":                                          `1`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.TimeoutSeconds":                                            `1`,
 | 
						|
		".Spec.InitContainers[0].Resources.Requests":                                                       `{"":"0"}`, // this gets defaulted from the limits field
 | 
						|
		".Spec.InitContainers[0].TerminationMessagePath":                                                   `"/dev/termination-log"`,
 | 
						|
		".Spec.InitContainers[0].TerminationMessagePolicy":                                                 `"File"`,
 | 
						|
		".Spec.InitContainers[0].StartupProbe.FailureThreshold":                                            "3",
 | 
						|
		".Spec.InitContainers[0].StartupProbe.PeriodSeconds":                                               "10",
 | 
						|
		".Spec.InitContainers[0].StartupProbe.SuccessThreshold":                                            "1",
 | 
						|
		".Spec.InitContainers[0].StartupProbe.TimeoutSeconds":                                              "1",
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.ProbeHandler.GRPC.Service":    `""`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.ProbeHandler.HTTPGet.Path":    `"/"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.LivenessProbe.ProbeHandler.HTTPGet.Scheme":  `"HTTP"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.ProbeHandler.GRPC.Service":   `""`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.ProbeHandler.HTTPGet.Path":   `"/"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.ReadinessProbe.ProbeHandler.HTTPGet.Scheme": `"HTTP"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.ProbeHandler.GRPC.Service":     `""`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.ProbeHandler.HTTPGet.Path":     `"/"`,
 | 
						|
		".Spec.EphemeralContainers[0].EphemeralContainerCommon.StartupProbe.ProbeHandler.HTTPGet.Scheme":   `"HTTP"`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.ProbeHandler.GRPC.Service":                                  `""`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.ProbeHandler.HTTPGet.Path":                                  `"/"`,
 | 
						|
		".Spec.InitContainers[0].LivenessProbe.ProbeHandler.HTTPGet.Scheme":                                `"HTTP"`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.ProbeHandler.GRPC.Service":                                 `""`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.ProbeHandler.HTTPGet.Path":                                 `"/"`,
 | 
						|
		".Spec.InitContainers[0].ReadinessProbe.ProbeHandler.HTTPGet.Scheme":                               `"HTTP"`,
 | 
						|
		".Spec.InitContainers[0].StartupProbe.ProbeHandler.GRPC.Service":                                   `""`,
 | 
						|
		".Spec.InitContainers[0].StartupProbe.ProbeHandler.HTTPGet.Path":                                   `"/"`,
 | 
						|
		".Spec.InitContainers[0].StartupProbe.ProbeHandler.HTTPGet.Scheme":                                 `"HTTP"`,
 | 
						|
		".Spec.RestartPolicy":                                                                         `"Always"`,
 | 
						|
		".Spec.SchedulerName":                                                                         `"default-scheduler"`,
 | 
						|
		".Spec.SecurityContext":                                                                       `{}`,
 | 
						|
		".Spec.TerminationGracePeriodSeconds":                                                         `30`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.AzureDisk.CachingMode":                                         `"ReadWrite"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.AzureDisk.FSType":                                              `"ext4"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.AzureDisk.Kind":                                                `"Shared"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.AzureDisk.ReadOnly":                                            `false`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.ConfigMap.DefaultMode":                                         `420`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.DownwardAPI.DefaultMode":                                       `420`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.DownwardAPI.Items[0].FieldRef.APIVersion":                      `"v1"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.EmptyDir":                                                      `{}`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Ephemeral.VolumeClaimTemplate.Spec.VolumeMode":                 `"Filesystem"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.HostPath.Type":                                                 `""`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.ISCSI.ISCSIInterface":                                          `"default"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Image.PullPolicy":                                              `"IfNotPresent"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Projected.DefaultMode":                                         `420`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Projected.Sources[0].DownwardAPI.Items[0].FieldRef.APIVersion": `"v1"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Projected.Sources[0].ServiceAccountToken.ExpirationSeconds":    `3600`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.RBD.Keyring":                                                   `"/etc/ceph/keyring"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.RBD.RBDPool":                                                   `"rbd"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.RBD.RadosUser":                                                 `"admin"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.ScaleIO.FSType":                                                `"xfs"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.ScaleIO.StorageMode":                                           `"ThinProvisioned"`,
 | 
						|
		".Spec.Volumes[0].VolumeSource.Secret.DefaultMode":                                            `420`,
 | 
						|
	}
 | 
						|
	if !featuresEnabled {
 | 
						|
		delete(expectedDefaults, ".Spec.Volumes[0].VolumeSource.Image.PullPolicy")
 | 
						|
	}
 | 
						|
	defaults := detectDefaults(t, pod, reflect.ValueOf(pod))
 | 
						|
	if !reflect.DeepEqual(expectedDefaults, defaults) {
 | 
						|
		t.Errorf("Defaults for PodSpec changed. This can cause spurious restarts of containers on API server upgrade.")
 | 
						|
		t.Log(cmp.Diff(expectedDefaults, defaults))
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestPodHostNetworkDefaults(t *testing.T) {
 | 
						|
	cases := []struct {
 | 
						|
		name                 string
 | 
						|
		hostNet              bool
 | 
						|
		expectPodDefault     bool
 | 
						|
		expectPodSpecDefault bool
 | 
						|
	}{{
 | 
						|
		name:                 "hostNetwork=false",
 | 
						|
		hostNet:              false,
 | 
						|
		expectPodDefault:     false,
 | 
						|
		expectPodSpecDefault: false,
 | 
						|
	}, {
 | 
						|
		name:                 "hostNetwork=true",
 | 
						|
		hostNet:              true,
 | 
						|
		expectPodDefault:     true,
 | 
						|
		expectPodSpecDefault: false,
 | 
						|
	}}
 | 
						|
 | 
						|
	for _, tc := range cases {
 | 
						|
		t.Run(tc.name, func(t *testing.T) {
 | 
						|
			const portNum = 12345
 | 
						|
			spec := v1.PodSpec{
 | 
						|
				HostNetwork: tc.hostNet,
 | 
						|
				Containers: []v1.Container{{
 | 
						|
					Ports: []v1.ContainerPort{{
 | 
						|
						ContainerPort: portNum,
 | 
						|
						Protocol:      v1.ProtocolTCP,
 | 
						|
						// Note: HostPort is not set
 | 
						|
					}},
 | 
						|
				}},
 | 
						|
			}
 | 
						|
 | 
						|
			// Test Pod defaulting.
 | 
						|
			p := v1.Pod{Spec: *spec.DeepCopy()}
 | 
						|
			corev1.SetDefaults_Pod(&p)
 | 
						|
			if got := p.Spec.Containers[0].Ports[0].HostPort; tc.expectPodDefault && got == 0 {
 | 
						|
				t.Errorf("expected Pod HostPort to be defaulted, got %v", got)
 | 
						|
			}
 | 
						|
			if got := p.Spec.Containers[0].Ports[0].HostPort; !tc.expectPodDefault && got != 0 {
 | 
						|
				t.Errorf("expected Pod HostPort to be 0, got %v", got)
 | 
						|
			}
 | 
						|
 | 
						|
			// Test PodSpec defaulting.
 | 
						|
			s := spec.DeepCopy()
 | 
						|
			corev1.SetDefaults_PodSpec(s)
 | 
						|
			if got := s.Containers[0].Ports[0].HostPort; tc.expectPodSpecDefault && got == 0 {
 | 
						|
				t.Errorf("expected PodSpec HostPort to be defaulted, got %v", got)
 | 
						|
			}
 | 
						|
			if got := s.Containers[0].Ports[0].HostPort; !tc.expectPodSpecDefault && got != 0 {
 | 
						|
				t.Errorf("expected PodSpec HostPort to be 0, got %v", got)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
type testPath struct {
 | 
						|
	path  string
 | 
						|
	value reflect.Value
 | 
						|
}
 | 
						|
 | 
						|
func detectDefaults(t *testing.T, obj runtime.Object, v reflect.Value) map[string]string {
 | 
						|
	defaults := map[string]string{}
 | 
						|
	toVisit := []testPath{{path: "", value: v}}
 | 
						|
 | 
						|
	for len(toVisit) > 0 {
 | 
						|
		visit := toVisit[0]
 | 
						|
		toVisit = toVisit[1:]
 | 
						|
 | 
						|
		legacyscheme.Scheme.Default(obj)
 | 
						|
		defaultedV := visit.value
 | 
						|
		zeroV := reflect.Zero(visit.value.Type())
 | 
						|
 | 
						|
		switch {
 | 
						|
		case visit.value.Kind() == reflect.Struct:
 | 
						|
			for fi := 0; fi < visit.value.NumField(); fi++ {
 | 
						|
				structField := visit.value.Type().Field(fi)
 | 
						|
				valueField := visit.value.Field(fi)
 | 
						|
				if valueField.CanSet() {
 | 
						|
					toVisit = append(toVisit, testPath{path: visit.path + "." + structField.Name, value: valueField})
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
		case visit.value.Kind() == reflect.Slice:
 | 
						|
			if !visit.value.IsNil() {
 | 
						|
				// if we already have a value, we either got defaulted or there
 | 
						|
				// was a fixed input - flag it and see if we can descend
 | 
						|
				// anyway.
 | 
						|
				marshaled, _ := json.Marshal(defaultedV.Interface())
 | 
						|
				defaults[visit.path] = string(marshaled)
 | 
						|
				toVisit = append(toVisit, testPath{path: visit.path + "[0]", value: visit.value.Index(0)})
 | 
						|
			} else if visit.value.Type().Elem().Kind() == reflect.Struct {
 | 
						|
				if strings.HasPrefix(visit.path, ".ObjectMeta.ManagedFields[") {
 | 
						|
					break
 | 
						|
				}
 | 
						|
				// if we don't already have a value, and contain structs, add an empty item so we can recurse
 | 
						|
				item := reflect.New(visit.value.Type().Elem()).Elem()
 | 
						|
				visit.value.Set(reflect.Append(visit.value, item))
 | 
						|
				toVisit = append(toVisit, testPath{path: visit.path + "[0]", value: visit.value.Index(0)})
 | 
						|
			} else if !isPrimitive(visit.value.Type().Elem().Kind()) {
 | 
						|
				t.Logf("unhandled non-primitive slice type %s: %s", visit.path, visit.value.Type().Elem())
 | 
						|
			}
 | 
						|
 | 
						|
		case visit.value.Kind() == reflect.Map:
 | 
						|
			if !visit.value.IsNil() {
 | 
						|
				// if we already have a value, we got defaulted
 | 
						|
				marshaled, _ := json.Marshal(defaultedV.Interface())
 | 
						|
				defaults[visit.path] = string(marshaled)
 | 
						|
			} else if visit.value.Type().Key().Kind() == reflect.String && visit.value.Type().Elem().Kind() == reflect.Struct {
 | 
						|
				if strings.HasPrefix(visit.path, ".ObjectMeta.ManagedFields[") {
 | 
						|
					break
 | 
						|
				}
 | 
						|
				// if we don't already have a value, and contain structs, add an empty item so we can recurse
 | 
						|
				item := reflect.New(visit.value.Type().Elem()).Elem()
 | 
						|
				visit.value.Set(reflect.MakeMap(visit.value.Type()))
 | 
						|
				visit.value.SetMapIndex(reflect.New(visit.value.Type().Key()).Elem(), item)
 | 
						|
				toVisit = append(toVisit, testPath{path: visit.path + "[*]", value: item})
 | 
						|
			} else if !isPrimitive(visit.value.Type().Elem().Kind()) {
 | 
						|
				t.Logf("unhandled non-primitive map type %s: %s", visit.path, visit.value.Type().Elem())
 | 
						|
			}
 | 
						|
 | 
						|
		case visit.value.Kind() == reflect.Pointer:
 | 
						|
			if visit.value.IsNil() {
 | 
						|
				if visit.value.Type().Elem().Kind() == reflect.Struct {
 | 
						|
					visit.value.Set(reflect.New(visit.value.Type().Elem()))
 | 
						|
					toVisit = append(toVisit, testPath{path: visit.path, value: visit.value.Elem()})
 | 
						|
				} else if !isPrimitive(visit.value.Type().Elem().Kind()) {
 | 
						|
					t.Errorf("unhandled non-primitive nil ptr: %s: %s", visit.path, visit.value.Type())
 | 
						|
				}
 | 
						|
			} else {
 | 
						|
				if visit.path != "" {
 | 
						|
					marshaled, _ := json.Marshal(defaultedV.Interface())
 | 
						|
					defaults[visit.path] = string(marshaled)
 | 
						|
				}
 | 
						|
				toVisit = append(toVisit, testPath{path: visit.path, value: visit.value.Elem()})
 | 
						|
			}
 | 
						|
 | 
						|
		case isPrimitive(visit.value.Kind()):
 | 
						|
			if !reflect.DeepEqual(defaultedV.Interface(), zeroV.Interface()) {
 | 
						|
				marshaled, _ := json.Marshal(defaultedV.Interface())
 | 
						|
				defaults[visit.path] = string(marshaled)
 | 
						|
			}
 | 
						|
 | 
						|
		default:
 | 
						|
			t.Errorf("unhandled kind: %s: %s", visit.path, visit.value.Type())
 | 
						|
		}
 | 
						|
 | 
						|
	}
 | 
						|
	return defaults
 | 
						|
}
 | 
						|
 | 
						|
func isPrimitive(k reflect.Kind) bool {
 | 
						|
	switch k {
 | 
						|
	case reflect.String, reflect.Bool, reflect.Int32, reflect.Int64, reflect.Int:
 | 
						|
		return true
 | 
						|
	default:
 | 
						|
		return false
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func roundTrip(t *testing.T, obj runtime.Object) runtime.Object {
 | 
						|
	codec := legacyscheme.Codecs.LegacyCodec(corev1.SchemeGroupVersion)
 | 
						|
	data, err := runtime.Encode(codec, obj)
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("%v\n %#v", err, obj)
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	obj2, err := runtime.Decode(codec, data)
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("%v\nData: %s\nSource: %#v", err, string(data), obj)
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	obj3 := reflect.New(reflect.TypeOf(obj).Elem()).Interface().(runtime.Object)
 | 
						|
	err = legacyscheme.Scheme.Convert(obj2, obj3, nil)
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("%v\nSource: %#v", err, obj2)
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	return obj3
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultReplicationController(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		rc             *v1.ReplicationController
 | 
						|
		expectLabels   bool
 | 
						|
		expectSelector bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			rc: &v1.ReplicationController{
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						ObjectMeta: metav1.ObjectMeta{
 | 
						|
							Labels: map[string]string{
 | 
						|
								"foo": "bar",
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectLabels:   true,
 | 
						|
			expectSelector: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			rc: &v1.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: map[string]string{
 | 
						|
						"bar": "foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						ObjectMeta: metav1.ObjectMeta{
 | 
						|
							Labels: map[string]string{
 | 
						|
								"foo": "bar",
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectLabels:   false,
 | 
						|
			expectSelector: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			rc: &v1.ReplicationController{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: map[string]string{
 | 
						|
						"bar": "foo",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Selector: map[string]string{
 | 
						|
						"some": "other",
 | 
						|
					},
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						ObjectMeta: metav1.ObjectMeta{
 | 
						|
							Labels: map[string]string{
 | 
						|
								"foo": "bar",
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectLabels:   false,
 | 
						|
			expectSelector: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			rc: &v1.ReplicationController{
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Selector: map[string]string{
 | 
						|
						"some": "other",
 | 
						|
					},
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						ObjectMeta: metav1.ObjectMeta{
 | 
						|
							Labels: map[string]string{
 | 
						|
								"foo": "bar",
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectLabels:   true,
 | 
						|
			expectSelector: false,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		rc := test.rc
 | 
						|
		obj2 := roundTrip(t, runtime.Object(rc))
 | 
						|
		rc2, ok := obj2.(*v1.ReplicationController)
 | 
						|
		if !ok {
 | 
						|
			t.Errorf("unexpected object: %v", rc2)
 | 
						|
			t.FailNow()
 | 
						|
		}
 | 
						|
		if test.expectSelector != reflect.DeepEqual(rc2.Spec.Selector, rc2.Spec.Template.Labels) {
 | 
						|
			if test.expectSelector {
 | 
						|
				t.Errorf("expected: %v, got: %v", rc2.Spec.Template.Labels, rc2.Spec.Selector)
 | 
						|
			} else {
 | 
						|
				t.Errorf("unexpected equality: %v", rc.Spec.Selector)
 | 
						|
			}
 | 
						|
		}
 | 
						|
		if test.expectLabels != reflect.DeepEqual(rc2.Labels, rc2.Spec.Template.Labels) {
 | 
						|
			if test.expectLabels {
 | 
						|
				t.Errorf("expected: %v, got: %v", rc2.Spec.Template.Labels, rc2.Labels)
 | 
						|
			} else {
 | 
						|
				t.Errorf("unexpected equality: %v", rc.Labels)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultReplicationControllerReplicas(t *testing.T) {
 | 
						|
	tests := []struct {
 | 
						|
		rc             v1.ReplicationController
 | 
						|
		expectReplicas int32
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			rc: v1.ReplicationController{
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						ObjectMeta: metav1.ObjectMeta{
 | 
						|
							Labels: map[string]string{
 | 
						|
								"foo": "bar",
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectReplicas: 1,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			rc: v1.ReplicationController{
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Replicas: utilpointer.Int32(0),
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						ObjectMeta: metav1.ObjectMeta{
 | 
						|
							Labels: map[string]string{
 | 
						|
								"foo": "bar",
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectReplicas: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			rc: v1.ReplicationController{
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Replicas: utilpointer.Int32(3),
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						ObjectMeta: metav1.ObjectMeta{
 | 
						|
							Labels: map[string]string{
 | 
						|
								"foo": "bar",
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectReplicas: 3,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		rc := &test.rc
 | 
						|
		obj2 := roundTrip(t, runtime.Object(rc))
 | 
						|
		rc2, ok := obj2.(*v1.ReplicationController)
 | 
						|
		if !ok {
 | 
						|
			t.Errorf("unexpected object: %v", rc2)
 | 
						|
			t.FailNow()
 | 
						|
		}
 | 
						|
		if rc2.Spec.Replicas == nil {
 | 
						|
			t.Errorf("unexpected nil Replicas")
 | 
						|
		} else if test.expectReplicas != *rc2.Spec.Replicas {
 | 
						|
			t.Errorf("expected: %d replicas, got: %d", test.expectReplicas, *rc2.Spec.Replicas)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
type InitContainerValidator func(got, expected *v1.Container) error
 | 
						|
 | 
						|
func TestSetDefaultReplicationControllerInitContainers(t *testing.T) {
 | 
						|
	assertEnvFieldRef := func(got, expected *v1.Container) error {
 | 
						|
		if len(got.Env) != len(expected.Env) {
 | 
						|
			return fmt.Errorf("different number of env: got <%v>, expected <%v>", len(got.Env), len(expected.Env))
 | 
						|
		}
 | 
						|
 | 
						|
		for j := range got.Env {
 | 
						|
			ge := &got.Env[j]
 | 
						|
			ee := &expected.Env[j]
 | 
						|
 | 
						|
			if ge.Name != ee.Name {
 | 
						|
				return fmt.Errorf("different name of env: got <%v>, expected <%v>", ge.Name, ee.Name)
 | 
						|
			}
 | 
						|
 | 
						|
			if ge.ValueFrom.FieldRef.APIVersion != ee.ValueFrom.FieldRef.APIVersion {
 | 
						|
				return fmt.Errorf("different api version of FieldRef <%v>: got <%v>, expected <%v>",
 | 
						|
					ge.Name, ge.ValueFrom.FieldRef.APIVersion, ee.ValueFrom.FieldRef.APIVersion)
 | 
						|
			}
 | 
						|
		}
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	assertImagePullPolicy := func(got, expected *v1.Container) error {
 | 
						|
		if got.ImagePullPolicy != expected.ImagePullPolicy {
 | 
						|
			return fmt.Errorf("different image pull policy: got <%v>, expected <%v>", got.ImagePullPolicy, expected.ImagePullPolicy)
 | 
						|
		}
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	assertContainerPort := func(got, expected *v1.Container) error {
 | 
						|
		if len(got.Ports) != len(expected.Ports) {
 | 
						|
			return fmt.Errorf("different number of ports: got <%v>, expected <%v>", len(got.Ports), len(expected.Ports))
 | 
						|
		}
 | 
						|
 | 
						|
		for i := range got.Ports {
 | 
						|
			gp := &got.Ports[i]
 | 
						|
			ep := &expected.Ports[i]
 | 
						|
 | 
						|
			if gp.Name != ep.Name {
 | 
						|
				return fmt.Errorf("different name of port: got <%v>, expected <%v>", gp.Name, ep.Name)
 | 
						|
			}
 | 
						|
 | 
						|
			if gp.Protocol != ep.Protocol {
 | 
						|
				return fmt.Errorf("different port protocol <%v>: got <%v>, expected <%v>", gp.Name, gp.Protocol, ep.Protocol)
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	assertResource := func(got, expected *v1.Container) error {
 | 
						|
		if len(got.Resources.Limits) != len(expected.Resources.Limits) {
 | 
						|
			return fmt.Errorf("different number of resources.Limits: got <%v>, expected <%v>", len(got.Resources.Limits), (expected.Resources.Limits))
 | 
						|
		}
 | 
						|
 | 
						|
		for k, v := range got.Resources.Limits {
 | 
						|
			if ev, found := expected.Resources.Limits[v1.ResourceName(k)]; !found {
 | 
						|
				return fmt.Errorf("failed to find resource <%v> in expected resources.Limits.", k)
 | 
						|
			} else {
 | 
						|
				if ev.Value() != v.Value() {
 | 
						|
					return fmt.Errorf("different resource.Limits: got <%v>, expected <%v>.", v.Value(), ev.Value())
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		if len(got.Resources.Requests) != len(expected.Resources.Requests) {
 | 
						|
			return fmt.Errorf("different number of resources.Requests: got <%v>, expected <%v>", len(got.Resources.Requests), (expected.Resources.Requests))
 | 
						|
		}
 | 
						|
 | 
						|
		for k, v := range got.Resources.Requests {
 | 
						|
			if ev, found := expected.Resources.Requests[v1.ResourceName(k)]; !found {
 | 
						|
				return fmt.Errorf("failed to find resource <%v> in expected resources.Requests.", k)
 | 
						|
			} else {
 | 
						|
				if ev.Value() != v.Value() {
 | 
						|
					return fmt.Errorf("different resource.Requests: got <%v>, expected <%v>.", v.Value(), ev.Value())
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	assertProb := func(got, expected *v1.Container) error {
 | 
						|
		// Assert LivenessProbe
 | 
						|
		if got.LivenessProbe.ProbeHandler.HTTPGet.Path != expected.LivenessProbe.ProbeHandler.HTTPGet.Path ||
 | 
						|
			got.LivenessProbe.ProbeHandler.HTTPGet.Scheme != expected.LivenessProbe.ProbeHandler.HTTPGet.Scheme ||
 | 
						|
			got.LivenessProbe.FailureThreshold != expected.LivenessProbe.FailureThreshold ||
 | 
						|
			got.LivenessProbe.SuccessThreshold != expected.LivenessProbe.SuccessThreshold ||
 | 
						|
			got.LivenessProbe.PeriodSeconds != expected.LivenessProbe.PeriodSeconds ||
 | 
						|
			got.LivenessProbe.TimeoutSeconds != expected.LivenessProbe.TimeoutSeconds {
 | 
						|
			return fmt.Errorf("different LivenessProbe: got <%v>, expected <%v>", got.LivenessProbe, expected.LivenessProbe)
 | 
						|
		}
 | 
						|
 | 
						|
		// Assert ReadinessProbe
 | 
						|
		if got.ReadinessProbe.ProbeHandler.HTTPGet.Path != expected.ReadinessProbe.ProbeHandler.HTTPGet.Path ||
 | 
						|
			got.ReadinessProbe.ProbeHandler.HTTPGet.Scheme != expected.ReadinessProbe.ProbeHandler.HTTPGet.Scheme ||
 | 
						|
			got.ReadinessProbe.FailureThreshold != expected.ReadinessProbe.FailureThreshold ||
 | 
						|
			got.ReadinessProbe.SuccessThreshold != expected.ReadinessProbe.SuccessThreshold ||
 | 
						|
			got.ReadinessProbe.PeriodSeconds != expected.ReadinessProbe.PeriodSeconds ||
 | 
						|
			got.ReadinessProbe.TimeoutSeconds != expected.ReadinessProbe.TimeoutSeconds {
 | 
						|
			return fmt.Errorf("different ReadinessProbe: got <%v>, expected <%v>", got.ReadinessProbe, expected.ReadinessProbe)
 | 
						|
		}
 | 
						|
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	assertLifeCycle := func(got, expected *v1.Container) error {
 | 
						|
		if got.Lifecycle.PostStart.HTTPGet.Path != expected.Lifecycle.PostStart.HTTPGet.Path ||
 | 
						|
			got.Lifecycle.PostStart.HTTPGet.Scheme != expected.Lifecycle.PostStart.HTTPGet.Scheme {
 | 
						|
			return fmt.Errorf("different LifeCycle: got <%v>, expected <%v>", got.Lifecycle, expected.Lifecycle)
 | 
						|
		}
 | 
						|
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	cpu, _ := resource.ParseQuantity("100m")
 | 
						|
	mem, _ := resource.ParseQuantity("100Mi")
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		name       string
 | 
						|
		rc         v1.ReplicationController
 | 
						|
		expected   []v1.Container
 | 
						|
		validators []InitContainerValidator
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name: "imagePullIPolicy",
 | 
						|
			rc: v1.ReplicationController{
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						Spec: v1.PodSpec{
 | 
						|
							InitContainers: []v1.Container{
 | 
						|
								{
 | 
						|
									Name:  "install",
 | 
						|
									Image: "busybox",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: []v1.Container{
 | 
						|
				{
 | 
						|
					ImagePullPolicy: v1.PullAlways,
 | 
						|
				},
 | 
						|
			},
 | 
						|
			validators: []InitContainerValidator{assertImagePullPolicy},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "FieldRef",
 | 
						|
			rc: v1.ReplicationController{
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						Spec: v1.PodSpec{
 | 
						|
							InitContainers: []v1.Container{
 | 
						|
								{
 | 
						|
									Name:  "fun",
 | 
						|
									Image: "alpine",
 | 
						|
									Env: []v1.EnvVar{
 | 
						|
										{
 | 
						|
											Name: "MY_POD_IP",
 | 
						|
											ValueFrom: &v1.EnvVarSource{
 | 
						|
												FieldRef: &v1.ObjectFieldSelector{
 | 
						|
													APIVersion: "",
 | 
						|
													FieldPath:  "status.podIP",
 | 
						|
												},
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: []v1.Container{
 | 
						|
				{
 | 
						|
					Env: []v1.EnvVar{
 | 
						|
						{
 | 
						|
							Name: "MY_POD_IP",
 | 
						|
							ValueFrom: &v1.EnvVarSource{
 | 
						|
								FieldRef: &v1.ObjectFieldSelector{
 | 
						|
									APIVersion: "v1",
 | 
						|
									FieldPath:  "status.podIP",
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			validators: []InitContainerValidator{assertEnvFieldRef},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "ContainerPort",
 | 
						|
			rc: v1.ReplicationController{
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						Spec: v1.PodSpec{
 | 
						|
							InitContainers: []v1.Container{
 | 
						|
								{
 | 
						|
									Name:  "fun",
 | 
						|
									Image: "alpine",
 | 
						|
									Ports: []v1.ContainerPort{
 | 
						|
										{
 | 
						|
											Name: "default",
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: []v1.Container{
 | 
						|
				{
 | 
						|
					Ports: []v1.ContainerPort{
 | 
						|
						{
 | 
						|
							Name:     "default",
 | 
						|
							Protocol: v1.ProtocolTCP,
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			validators: []InitContainerValidator{assertContainerPort},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Resources",
 | 
						|
			rc: v1.ReplicationController{
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						Spec: v1.PodSpec{
 | 
						|
							InitContainers: []v1.Container{
 | 
						|
								{
 | 
						|
									Name:  "fun",
 | 
						|
									Image: "alpine",
 | 
						|
									Resources: v1.ResourceRequirements{
 | 
						|
										Limits: v1.ResourceList{
 | 
						|
											v1.ResourceCPU:    resource.MustParse("100m"),
 | 
						|
											v1.ResourceMemory: resource.MustParse("100Mi"),
 | 
						|
										},
 | 
						|
										Requests: v1.ResourceList{
 | 
						|
											v1.ResourceCPU:    resource.MustParse("100m"),
 | 
						|
											v1.ResourceMemory: resource.MustParse("100Mi"),
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: []v1.Container{
 | 
						|
				{
 | 
						|
					Resources: v1.ResourceRequirements{
 | 
						|
						Limits: v1.ResourceList{
 | 
						|
							v1.ResourceCPU:    cpu,
 | 
						|
							v1.ResourceMemory: mem,
 | 
						|
						},
 | 
						|
						Requests: v1.ResourceList{
 | 
						|
							v1.ResourceCPU:    cpu,
 | 
						|
							v1.ResourceMemory: mem,
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			validators: []InitContainerValidator{assertResource},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "Probe",
 | 
						|
			rc: v1.ReplicationController{
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						Spec: v1.PodSpec{
 | 
						|
							InitContainers: []v1.Container{
 | 
						|
								{
 | 
						|
									Name:  "fun",
 | 
						|
									Image: "alpine",
 | 
						|
									LivenessProbe: &v1.Probe{
 | 
						|
										ProbeHandler: v1.ProbeHandler{
 | 
						|
											HTTPGet: &v1.HTTPGetAction{
 | 
						|
												Host: "localhost",
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
									ReadinessProbe: &v1.Probe{
 | 
						|
										ProbeHandler: v1.ProbeHandler{
 | 
						|
											HTTPGet: &v1.HTTPGetAction{
 | 
						|
												Host: "localhost",
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: []v1.Container{
 | 
						|
				{
 | 
						|
					LivenessProbe: &v1.Probe{
 | 
						|
						ProbeHandler: v1.ProbeHandler{
 | 
						|
							HTTPGet: &v1.HTTPGetAction{
 | 
						|
								Path:   "/",
 | 
						|
								Scheme: v1.URISchemeHTTP,
 | 
						|
							},
 | 
						|
						},
 | 
						|
						TimeoutSeconds:   1,
 | 
						|
						PeriodSeconds:    10,
 | 
						|
						SuccessThreshold: 1,
 | 
						|
						FailureThreshold: 3,
 | 
						|
					},
 | 
						|
					ReadinessProbe: &v1.Probe{
 | 
						|
						ProbeHandler: v1.ProbeHandler{
 | 
						|
							HTTPGet: &v1.HTTPGetAction{
 | 
						|
								Path:   "/",
 | 
						|
								Scheme: v1.URISchemeHTTP,
 | 
						|
							},
 | 
						|
						},
 | 
						|
						TimeoutSeconds:   1,
 | 
						|
						PeriodSeconds:    10,
 | 
						|
						SuccessThreshold: 1,
 | 
						|
						FailureThreshold: 3,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			validators: []InitContainerValidator{assertProb},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name: "LifeCycle",
 | 
						|
			rc: v1.ReplicationController{
 | 
						|
				Spec: v1.ReplicationControllerSpec{
 | 
						|
					Template: &v1.PodTemplateSpec{
 | 
						|
						Spec: v1.PodSpec{
 | 
						|
							InitContainers: []v1.Container{
 | 
						|
								{
 | 
						|
									Name:  "fun",
 | 
						|
									Image: "alpine",
 | 
						|
									Ports: []v1.ContainerPort{
 | 
						|
										{
 | 
						|
											Name: "default",
 | 
						|
										},
 | 
						|
									},
 | 
						|
									Lifecycle: &v1.Lifecycle{
 | 
						|
										PostStart: &v1.LifecycleHandler{
 | 
						|
											HTTPGet: &v1.HTTPGetAction{
 | 
						|
												Host: "localhost",
 | 
						|
											},
 | 
						|
										},
 | 
						|
										PreStop: &v1.LifecycleHandler{
 | 
						|
											HTTPGet: &v1.HTTPGetAction{
 | 
						|
												Host: "localhost",
 | 
						|
											},
 | 
						|
										},
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expected: []v1.Container{
 | 
						|
				{
 | 
						|
					Lifecycle: &v1.Lifecycle{
 | 
						|
						PostStart: &v1.LifecycleHandler{
 | 
						|
							HTTPGet: &v1.HTTPGetAction{
 | 
						|
								Path:   "/",
 | 
						|
								Scheme: v1.URISchemeHTTP,
 | 
						|
							},
 | 
						|
						},
 | 
						|
						PreStop: &v1.LifecycleHandler{
 | 
						|
							HTTPGet: &v1.HTTPGetAction{
 | 
						|
								Path:   "/",
 | 
						|
								Scheme: v1.URISchemeHTTP,
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			validators: []InitContainerValidator{assertLifeCycle},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	assertInitContainers := func(got, expected []v1.Container, validators []InitContainerValidator) error {
 | 
						|
		if len(got) != len(expected) {
 | 
						|
			return fmt.Errorf("different number of init container: got <%d>, expected <%d>",
 | 
						|
				len(got), len(expected))
 | 
						|
		}
 | 
						|
 | 
						|
		for i := range got {
 | 
						|
			g := &got[i]
 | 
						|
			e := &expected[i]
 | 
						|
 | 
						|
			for _, validator := range validators {
 | 
						|
				if err := validator(g, e); err != nil {
 | 
						|
					return err
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		rc := &test.rc
 | 
						|
		obj2 := roundTrip(t, runtime.Object(rc))
 | 
						|
		rc2, ok := obj2.(*v1.ReplicationController)
 | 
						|
		if !ok {
 | 
						|
			t.Errorf("unexpected object: %v", rc2)
 | 
						|
			t.FailNow()
 | 
						|
		}
 | 
						|
 | 
						|
		if err := assertInitContainers(rc2.Spec.Template.Spec.InitContainers, test.expected, test.validators); err != nil {
 | 
						|
			t.Errorf("test %v failed: %v", test.name, err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultService(t *testing.T) {
 | 
						|
	svc := &v1.Service{}
 | 
						|
	obj2 := roundTrip(t, runtime.Object(svc))
 | 
						|
	svc2 := obj2.(*v1.Service)
 | 
						|
	if svc2.Spec.SessionAffinity != v1.ServiceAffinityNone {
 | 
						|
		t.Errorf("Expected default session affinity type:%s, got: %s", v1.ServiceAffinityNone, svc2.Spec.SessionAffinity)
 | 
						|
	}
 | 
						|
	if svc2.Spec.SessionAffinityConfig != nil {
 | 
						|
		t.Errorf("Expected empty session affinity config when session affinity type: %s, got: %v", v1.ServiceAffinityNone, svc2.Spec.SessionAffinityConfig)
 | 
						|
	}
 | 
						|
	if svc2.Spec.Type != v1.ServiceTypeClusterIP {
 | 
						|
		t.Errorf("Expected default type:%s, got: %s", v1.ServiceTypeClusterIP, svc2.Spec.Type)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultServiceSessionAffinityConfig(t *testing.T) {
 | 
						|
	testCases := map[string]v1.Service{
 | 
						|
		"SessionAffinityConfig is empty": {
 | 
						|
			Spec: v1.ServiceSpec{
 | 
						|
				SessionAffinity:       v1.ServiceAffinityClientIP,
 | 
						|
				SessionAffinityConfig: nil,
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"ClientIP is empty": {
 | 
						|
			Spec: v1.ServiceSpec{
 | 
						|
				SessionAffinity: v1.ServiceAffinityClientIP,
 | 
						|
				SessionAffinityConfig: &v1.SessionAffinityConfig{
 | 
						|
					ClientIP: nil,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"TimeoutSeconds is empty": {
 | 
						|
			Spec: v1.ServiceSpec{
 | 
						|
				SessionAffinity: v1.ServiceAffinityClientIP,
 | 
						|
				SessionAffinityConfig: &v1.SessionAffinityConfig{
 | 
						|
					ClientIP: &v1.ClientIPConfig{
 | 
						|
						TimeoutSeconds: nil,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for name, test := range testCases {
 | 
						|
		obj2 := roundTrip(t, runtime.Object(&test))
 | 
						|
		svc2 := obj2.(*v1.Service)
 | 
						|
		if svc2.Spec.SessionAffinityConfig == nil || svc2.Spec.SessionAffinityConfig.ClientIP == nil || svc2.Spec.SessionAffinityConfig.ClientIP.TimeoutSeconds == nil {
 | 
						|
			t.Fatalf("Case: %s, unexpected empty SessionAffinityConfig/ClientIP/TimeoutSeconds when session affinity type: %s, got: %v", name, v1.ServiceAffinityClientIP, svc2.Spec.SessionAffinityConfig)
 | 
						|
		}
 | 
						|
		if *svc2.Spec.SessionAffinityConfig.ClientIP.TimeoutSeconds != v1.DefaultClientIPServiceAffinitySeconds {
 | 
						|
			t.Errorf("Case: %s, default TimeoutSeconds should be %d when session affinity type: %s, got: %d", name, v1.DefaultClientIPServiceAffinitySeconds, v1.ServiceAffinityClientIP, *svc2.Spec.SessionAffinityConfig.ClientIP.TimeoutSeconds)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultServiceLoadbalancerIPMode(t *testing.T) {
 | 
						|
	modeVIP := v1.LoadBalancerIPModeVIP
 | 
						|
	modeProxy := v1.LoadBalancerIPModeProxy
 | 
						|
	testCases := []struct {
 | 
						|
		name           string
 | 
						|
		ipModeEnabled  bool
 | 
						|
		svc            *v1.Service
 | 
						|
		expectedIPMode []*v1.LoadBalancerIPMode
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:          "Set IP but not set IPMode with LoadbalancerIPMode disabled",
 | 
						|
			ipModeEnabled: false,
 | 
						|
			svc: &v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{Type: v1.ServiceTypeLoadBalancer},
 | 
						|
				Status: v1.ServiceStatus{
 | 
						|
					LoadBalancer: v1.LoadBalancerStatus{
 | 
						|
						Ingress: []v1.LoadBalancerIngress{{
 | 
						|
							IP: "1.2.3.4",
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				}},
 | 
						|
			expectedIPMode: []*v1.LoadBalancerIPMode{nil},
 | 
						|
		}, {
 | 
						|
			name:          "Set IP but bot set IPMode with LoadbalancerIPMode enabled",
 | 
						|
			ipModeEnabled: true,
 | 
						|
			svc: &v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{Type: v1.ServiceTypeLoadBalancer},
 | 
						|
				Status: v1.ServiceStatus{
 | 
						|
					LoadBalancer: v1.LoadBalancerStatus{
 | 
						|
						Ingress: []v1.LoadBalancerIngress{{
 | 
						|
							IP: "1.2.3.4",
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				}},
 | 
						|
			expectedIPMode: []*v1.LoadBalancerIPMode{&modeVIP},
 | 
						|
		}, {
 | 
						|
			name:          "Both IP and IPMode are set with LoadbalancerIPMode enabled",
 | 
						|
			ipModeEnabled: true,
 | 
						|
			svc: &v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{Type: v1.ServiceTypeLoadBalancer},
 | 
						|
				Status: v1.ServiceStatus{
 | 
						|
					LoadBalancer: v1.LoadBalancerStatus{
 | 
						|
						Ingress: []v1.LoadBalancerIngress{{
 | 
						|
							IP:     "1.2.3.4",
 | 
						|
							IPMode: &modeProxy,
 | 
						|
						}},
 | 
						|
					},
 | 
						|
				}},
 | 
						|
			expectedIPMode: []*v1.LoadBalancerIPMode{&modeProxy},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, tc := range testCases {
 | 
						|
		t.Run(tc.name, func(t *testing.T) {
 | 
						|
			if !tc.ipModeEnabled {
 | 
						|
				featuregatetesting.SetFeatureGateEmulationVersionDuringTest(t, utilfeature.DefaultFeatureGate, version.MustParse("1.31"))
 | 
						|
			}
 | 
						|
			featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.LoadBalancerIPMode, tc.ipModeEnabled)
 | 
						|
			obj := roundTrip(t, runtime.Object(tc.svc))
 | 
						|
			svc := obj.(*v1.Service)
 | 
						|
			for i, s := range svc.Status.LoadBalancer.Ingress {
 | 
						|
				got := s.IPMode
 | 
						|
				expected := tc.expectedIPMode[i]
 | 
						|
				if !reflect.DeepEqual(got, expected) {
 | 
						|
					t.Errorf("Expected IPMode %v, got %v", tc.expectedIPMode[i], s.IPMode)
 | 
						|
				}
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultSecretVolumeSource(t *testing.T) {
 | 
						|
	s := v1.PodSpec{}
 | 
						|
	s.Volumes = []v1.Volume{
 | 
						|
		{
 | 
						|
			VolumeSource: v1.VolumeSource{
 | 
						|
				Secret: &v1.SecretVolumeSource{},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	pod := &v1.Pod{
 | 
						|
		Spec: s,
 | 
						|
	}
 | 
						|
	output := roundTrip(t, runtime.Object(pod))
 | 
						|
	pod2 := output.(*v1.Pod)
 | 
						|
	defaultMode := pod2.Spec.Volumes[0].VolumeSource.Secret.DefaultMode
 | 
						|
	expectedMode := v1.SecretVolumeSourceDefaultMode
 | 
						|
 | 
						|
	if defaultMode == nil || *defaultMode != expectedMode {
 | 
						|
		t.Errorf("Expected secret DefaultMode %v, got %v", expectedMode, defaultMode)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultConfigMapVolumeSource(t *testing.T) {
 | 
						|
	s := v1.PodSpec{}
 | 
						|
	s.Volumes = []v1.Volume{
 | 
						|
		{
 | 
						|
			VolumeSource: v1.VolumeSource{
 | 
						|
				ConfigMap: &v1.ConfigMapVolumeSource{},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	pod := &v1.Pod{
 | 
						|
		Spec: s,
 | 
						|
	}
 | 
						|
	output := roundTrip(t, runtime.Object(pod))
 | 
						|
	pod2 := output.(*v1.Pod)
 | 
						|
	defaultMode := pod2.Spec.Volumes[0].VolumeSource.ConfigMap.DefaultMode
 | 
						|
	expectedMode := v1.ConfigMapVolumeSourceDefaultMode
 | 
						|
 | 
						|
	if defaultMode == nil || *defaultMode != expectedMode {
 | 
						|
		t.Errorf("Expected v1.ConfigMap DefaultMode %v, got %v", expectedMode, defaultMode)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultDownwardAPIVolumeSource(t *testing.T) {
 | 
						|
	s := v1.PodSpec{}
 | 
						|
	s.Volumes = []v1.Volume{
 | 
						|
		{
 | 
						|
			VolumeSource: v1.VolumeSource{
 | 
						|
				DownwardAPI: &v1.DownwardAPIVolumeSource{},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	pod := &v1.Pod{
 | 
						|
		Spec: s,
 | 
						|
	}
 | 
						|
	output := roundTrip(t, runtime.Object(pod))
 | 
						|
	pod2 := output.(*v1.Pod)
 | 
						|
	defaultMode := pod2.Spec.Volumes[0].VolumeSource.DownwardAPI.DefaultMode
 | 
						|
	expectedMode := v1.DownwardAPIVolumeSourceDefaultMode
 | 
						|
 | 
						|
	if defaultMode == nil || *defaultMode != expectedMode {
 | 
						|
		t.Errorf("Expected DownwardAPI DefaultMode %v, got %v", expectedMode, defaultMode)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultProjectedVolumeSource(t *testing.T) {
 | 
						|
	s := v1.PodSpec{}
 | 
						|
	s.Volumes = []v1.Volume{
 | 
						|
		{
 | 
						|
			VolumeSource: v1.VolumeSource{
 | 
						|
				Projected: &v1.ProjectedVolumeSource{},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	pod := &v1.Pod{
 | 
						|
		Spec: s,
 | 
						|
	}
 | 
						|
	output := roundTrip(t, runtime.Object(pod))
 | 
						|
	pod2 := output.(*v1.Pod)
 | 
						|
	defaultMode := pod2.Spec.Volumes[0].VolumeSource.Projected.DefaultMode
 | 
						|
	expectedMode := v1.ProjectedVolumeSourceDefaultMode
 | 
						|
 | 
						|
	if defaultMode == nil || *defaultMode != expectedMode {
 | 
						|
		t.Errorf("Expected v1.ProjectedVolumeSource DefaultMode %v, got %v", expectedMode, defaultMode)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultSecret(t *testing.T) {
 | 
						|
	s := &v1.Secret{}
 | 
						|
	obj2 := roundTrip(t, runtime.Object(s))
 | 
						|
	s2 := obj2.(*v1.Secret)
 | 
						|
 | 
						|
	if s2.Type != v1.SecretTypeOpaque {
 | 
						|
		t.Errorf("Expected secret type %v, got %v", v1.SecretTypeOpaque, s2.Type)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultPersistentVolume(t *testing.T) {
 | 
						|
	fsMode := v1.PersistentVolumeFilesystem
 | 
						|
	blockMode := v1.PersistentVolumeBlock
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		name               string
 | 
						|
		volumeMode         *v1.PersistentVolumeMode
 | 
						|
		expectedVolumeMode v1.PersistentVolumeMode
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:               "volume mode nil",
 | 
						|
			volumeMode:         nil,
 | 
						|
			expectedVolumeMode: v1.PersistentVolumeFilesystem,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:               "volume mode filesystem",
 | 
						|
			volumeMode:         &fsMode,
 | 
						|
			expectedVolumeMode: v1.PersistentVolumeFilesystem,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:               "volume mode block",
 | 
						|
			volumeMode:         &blockMode,
 | 
						|
			expectedVolumeMode: v1.PersistentVolumeBlock,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		pv := &v1.PersistentVolume{
 | 
						|
			Spec: v1.PersistentVolumeSpec{
 | 
						|
				VolumeMode: test.volumeMode,
 | 
						|
			},
 | 
						|
		}
 | 
						|
		obj1 := roundTrip(t, runtime.Object(pv))
 | 
						|
		pv1 := obj1.(*v1.PersistentVolume)
 | 
						|
		if pv1.Status.Phase != v1.VolumePending {
 | 
						|
			t.Errorf("Expected claim phase %v, got %v", v1.ClaimPending, pv1.Status.Phase)
 | 
						|
		}
 | 
						|
		if pv1.Spec.PersistentVolumeReclaimPolicy != v1.PersistentVolumeReclaimRetain {
 | 
						|
			t.Errorf("Expected pv reclaim policy %v, got %v", v1.PersistentVolumeReclaimRetain, pv1.Spec.PersistentVolumeReclaimPolicy)
 | 
						|
		}
 | 
						|
		if *pv1.Spec.VolumeMode != test.expectedVolumeMode {
 | 
						|
			t.Errorf("Test %s failed, Expected VolumeMode: %v, but got %v", test.name, test.volumeMode, *pv1.Spec.VolumeMode)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultPersistentVolumeClaim(t *testing.T) {
 | 
						|
	fsMode := v1.PersistentVolumeFilesystem
 | 
						|
	blockMode := v1.PersistentVolumeBlock
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		name               string
 | 
						|
		volumeMode         *v1.PersistentVolumeMode
 | 
						|
		expectedVolumeMode v1.PersistentVolumeMode
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:               "volume mode nil",
 | 
						|
			volumeMode:         nil,
 | 
						|
			expectedVolumeMode: v1.PersistentVolumeFilesystem,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:               "volume mode filesystem",
 | 
						|
			volumeMode:         &fsMode,
 | 
						|
			expectedVolumeMode: v1.PersistentVolumeFilesystem,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:               "volume mode block",
 | 
						|
			volumeMode:         &blockMode,
 | 
						|
			expectedVolumeMode: v1.PersistentVolumeBlock,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		pvc := &v1.PersistentVolumeClaim{
 | 
						|
			Spec: v1.PersistentVolumeClaimSpec{
 | 
						|
				VolumeMode: test.volumeMode,
 | 
						|
			},
 | 
						|
		}
 | 
						|
		obj1 := roundTrip(t, runtime.Object(pvc))
 | 
						|
		pvc1 := obj1.(*v1.PersistentVolumeClaim)
 | 
						|
		if pvc1.Status.Phase != v1.ClaimPending {
 | 
						|
			t.Errorf("Expected claim phase %v, got %v", v1.ClaimPending, pvc1.Status.Phase)
 | 
						|
		}
 | 
						|
		if *pvc1.Spec.VolumeMode != test.expectedVolumeMode {
 | 
						|
			t.Errorf("Test %s failed, Expected VolumeMode: %v, but got %v", test.name, test.volumeMode, *pvc1.Spec.VolumeMode)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultEphemeral(t *testing.T) {
 | 
						|
	fsMode := v1.PersistentVolumeFilesystem
 | 
						|
	blockMode := v1.PersistentVolumeBlock
 | 
						|
 | 
						|
	tests := []struct {
 | 
						|
		name               string
 | 
						|
		volumeMode         *v1.PersistentVolumeMode
 | 
						|
		expectedVolumeMode v1.PersistentVolumeMode
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:               "volume mode nil",
 | 
						|
			volumeMode:         nil,
 | 
						|
			expectedVolumeMode: v1.PersistentVolumeFilesystem,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:               "volume mode filesystem",
 | 
						|
			volumeMode:         &fsMode,
 | 
						|
			expectedVolumeMode: v1.PersistentVolumeFilesystem,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:               "volume mode block",
 | 
						|
			volumeMode:         &blockMode,
 | 
						|
			expectedVolumeMode: v1.PersistentVolumeBlock,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range tests {
 | 
						|
		pod := &v1.Pod{
 | 
						|
			Spec: v1.PodSpec{
 | 
						|
				Volumes: []v1.Volume{
 | 
						|
					{
 | 
						|
						VolumeSource: v1.VolumeSource{
 | 
						|
							Ephemeral: &v1.EphemeralVolumeSource{
 | 
						|
								VolumeClaimTemplate: &v1.PersistentVolumeClaimTemplate{
 | 
						|
									Spec: v1.PersistentVolumeClaimSpec{
 | 
						|
										VolumeMode: test.volumeMode,
 | 
						|
									},
 | 
						|
								},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		}
 | 
						|
		obj1 := roundTrip(t, runtime.Object(pod))
 | 
						|
		pod1 := obj1.(*v1.Pod)
 | 
						|
		if *pod1.Spec.Volumes[0].VolumeSource.Ephemeral.VolumeClaimTemplate.Spec.VolumeMode != test.expectedVolumeMode {
 | 
						|
			t.Errorf("Test %s failed, Expected VolumeMode: %v, but got %v", test.name, test.volumeMode, *pod1.Spec.Volumes[0].VolumeSource.Ephemeral.VolumeClaimTemplate.Spec.VolumeMode)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultEndpointsProtocol(t *testing.T) {
 | 
						|
	in := &v1.Endpoints{Subsets: []v1.EndpointSubset{
 | 
						|
		{Ports: []v1.EndpointPort{{}, {Protocol: "UDP"}, {}}},
 | 
						|
	}}
 | 
						|
	obj := roundTrip(t, runtime.Object(in))
 | 
						|
	out := obj.(*v1.Endpoints)
 | 
						|
 | 
						|
	for i := range out.Subsets {
 | 
						|
		for j := range out.Subsets[i].Ports {
 | 
						|
			if in.Subsets[i].Ports[j].Protocol == "" {
 | 
						|
				if out.Subsets[i].Ports[j].Protocol != v1.ProtocolTCP {
 | 
						|
					t.Errorf("Expected protocol %s, got %s", v1.ProtocolTCP, out.Subsets[i].Ports[j].Protocol)
 | 
						|
				}
 | 
						|
			} else {
 | 
						|
				if out.Subsets[i].Ports[j].Protocol != in.Subsets[i].Ports[j].Protocol {
 | 
						|
					t.Errorf("Expected protocol %s, got %s", in.Subsets[i].Ports[j].Protocol, out.Subsets[i].Ports[j].Protocol)
 | 
						|
				}
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultServiceTargetPort(t *testing.T) {
 | 
						|
	in := &v1.Service{Spec: v1.ServiceSpec{Ports: []v1.ServicePort{{Port: 1234}}}}
 | 
						|
	obj := roundTrip(t, runtime.Object(in))
 | 
						|
	out := obj.(*v1.Service)
 | 
						|
	if out.Spec.Ports[0].TargetPort != intstr.FromInt32(1234) {
 | 
						|
		t.Errorf("Expected TargetPort to be defaulted, got %v", out.Spec.Ports[0].TargetPort)
 | 
						|
	}
 | 
						|
 | 
						|
	in = &v1.Service{Spec: v1.ServiceSpec{Ports: []v1.ServicePort{{Port: 1234, TargetPort: intstr.FromInt32(5678)}}}}
 | 
						|
	obj = roundTrip(t, runtime.Object(in))
 | 
						|
	out = obj.(*v1.Service)
 | 
						|
	if out.Spec.Ports[0].TargetPort != intstr.FromInt32(5678) {
 | 
						|
		t.Errorf("Expected TargetPort to be unchanged, got %v", out.Spec.Ports[0].TargetPort)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultServicePort(t *testing.T) {
 | 
						|
	// Unchanged if set.
 | 
						|
	in := &v1.Service{Spec: v1.ServiceSpec{
 | 
						|
		Ports: []v1.ServicePort{
 | 
						|
			{Protocol: "UDP", Port: 9376, TargetPort: intstr.FromString("p")},
 | 
						|
			{Protocol: "UDP", Port: 8675, TargetPort: intstr.FromInt32(309)},
 | 
						|
		},
 | 
						|
	}}
 | 
						|
	out := roundTrip(t, runtime.Object(in)).(*v1.Service)
 | 
						|
	if out.Spec.Ports[0].Protocol != v1.ProtocolUDP {
 | 
						|
		t.Errorf("Expected protocol %s, got %s", v1.ProtocolUDP, out.Spec.Ports[0].Protocol)
 | 
						|
	}
 | 
						|
	if out.Spec.Ports[0].TargetPort != intstr.FromString("p") {
 | 
						|
		t.Errorf("Expected port %v, got %v", in.Spec.Ports[0].Port, out.Spec.Ports[0].TargetPort)
 | 
						|
	}
 | 
						|
	if out.Spec.Ports[1].Protocol != v1.ProtocolUDP {
 | 
						|
		t.Errorf("Expected protocol %s, got %s", v1.ProtocolUDP, out.Spec.Ports[1].Protocol)
 | 
						|
	}
 | 
						|
	if out.Spec.Ports[1].TargetPort != intstr.FromInt32(309) {
 | 
						|
		t.Errorf("Expected port %v, got %v", in.Spec.Ports[1].Port, out.Spec.Ports[1].TargetPort)
 | 
						|
	}
 | 
						|
 | 
						|
	// Defaulted.
 | 
						|
	in = &v1.Service{Spec: v1.ServiceSpec{
 | 
						|
		Ports: []v1.ServicePort{
 | 
						|
			{Protocol: "", Port: 9376, TargetPort: intstr.FromString("")},
 | 
						|
			{Protocol: "", Port: 8675, TargetPort: intstr.FromInt32(0)},
 | 
						|
		},
 | 
						|
	}}
 | 
						|
	out = roundTrip(t, runtime.Object(in)).(*v1.Service)
 | 
						|
	if out.Spec.Ports[0].Protocol != v1.ProtocolTCP {
 | 
						|
		t.Errorf("Expected protocol %s, got %s", v1.ProtocolTCP, out.Spec.Ports[0].Protocol)
 | 
						|
	}
 | 
						|
	if out.Spec.Ports[0].TargetPort != intstr.FromInt32(in.Spec.Ports[0].Port) {
 | 
						|
		t.Errorf("Expected port %v, got %v", in.Spec.Ports[0].Port, out.Spec.Ports[0].TargetPort)
 | 
						|
	}
 | 
						|
	if out.Spec.Ports[1].Protocol != v1.ProtocolTCP {
 | 
						|
		t.Errorf("Expected protocol %s, got %s", v1.ProtocolTCP, out.Spec.Ports[1].Protocol)
 | 
						|
	}
 | 
						|
	if out.Spec.Ports[1].TargetPort != intstr.FromInt32(in.Spec.Ports[1].Port) {
 | 
						|
		t.Errorf("Expected port %v, got %v", in.Spec.Ports[1].Port, out.Spec.Ports[1].TargetPort)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultServiceExternalTraffic(t *testing.T) {
 | 
						|
	in := &v1.Service{}
 | 
						|
	obj := roundTrip(t, runtime.Object(in))
 | 
						|
	out := obj.(*v1.Service)
 | 
						|
	if out.Spec.ExternalTrafficPolicy != "" {
 | 
						|
		t.Errorf("Expected ExternalTrafficPolicy to be empty, got %v", out.Spec.ExternalTrafficPolicy)
 | 
						|
	}
 | 
						|
 | 
						|
	in = &v1.Service{Spec: v1.ServiceSpec{Type: v1.ServiceTypeNodePort}}
 | 
						|
	obj = roundTrip(t, runtime.Object(in))
 | 
						|
	out = obj.(*v1.Service)
 | 
						|
	if out.Spec.ExternalTrafficPolicy != v1.ServiceExternalTrafficPolicyCluster {
 | 
						|
		t.Errorf("Expected ExternalTrafficPolicy to be %v, got %v", v1.ServiceExternalTrafficPolicyCluster, out.Spec.ExternalTrafficPolicy)
 | 
						|
	}
 | 
						|
 | 
						|
	in = &v1.Service{Spec: v1.ServiceSpec{Type: v1.ServiceTypeLoadBalancer}}
 | 
						|
	obj = roundTrip(t, runtime.Object(in))
 | 
						|
	out = obj.(*v1.Service)
 | 
						|
	if out.Spec.ExternalTrafficPolicy != v1.ServiceExternalTrafficPolicyCluster {
 | 
						|
		t.Errorf("Expected ExternalTrafficPolicy to be %v, got %v", v1.ServiceExternalTrafficPolicyCluster, out.Spec.ExternalTrafficPolicy)
 | 
						|
	}
 | 
						|
 | 
						|
	in = &v1.Service{Spec: v1.ServiceSpec{Type: v1.ServiceTypeClusterIP, ExternalIPs: []string{"1.2.3.4"}}}
 | 
						|
	obj = roundTrip(t, runtime.Object(in))
 | 
						|
	out = obj.(*v1.Service)
 | 
						|
	if out.Spec.ExternalTrafficPolicy != v1.ServiceExternalTrafficPolicyCluster {
 | 
						|
		t.Errorf("Expected ExternalTrafficPolicy to be %v, got %v", v1.ServiceExternalTrafficPolicyCluster, out.Spec.ExternalTrafficPolicy)
 | 
						|
	}
 | 
						|
 | 
						|
	in = &v1.Service{Spec: v1.ServiceSpec{Type: v1.ServiceTypeClusterIP}}
 | 
						|
	obj = roundTrip(t, runtime.Object(in))
 | 
						|
	out = obj.(*v1.Service)
 | 
						|
	if out.Spec.ExternalTrafficPolicy != "" {
 | 
						|
		t.Errorf("Expected ExternalTrafficPolicy to be empty, got %v", out.Spec.ExternalTrafficPolicy)
 | 
						|
	}
 | 
						|
 | 
						|
	in = &v1.Service{Spec: v1.ServiceSpec{Type: v1.ServiceTypeExternalName}}
 | 
						|
	obj = roundTrip(t, runtime.Object(in))
 | 
						|
	out = obj.(*v1.Service)
 | 
						|
	if out.Spec.ExternalTrafficPolicy != "" {
 | 
						|
		t.Errorf("Expected ExternalTrafficPolicy to be empty, got %v", out.Spec.ExternalTrafficPolicy)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultNamespace(t *testing.T) {
 | 
						|
	s := &v1.Namespace{}
 | 
						|
	obj2 := roundTrip(t, runtime.Object(s))
 | 
						|
	s2 := obj2.(*v1.Namespace)
 | 
						|
 | 
						|
	if s2.Status.Phase != v1.NamespaceActive {
 | 
						|
		t.Errorf("Expected phase %v, got %v", v1.NamespaceActive, s2.Status.Phase)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultNamespaceLabels(t *testing.T) {
 | 
						|
	theNs := "default-ns-labels-are-great"
 | 
						|
	s := &v1.Namespace{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name: theNs,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	obj2 := roundTrip(t, runtime.Object(s))
 | 
						|
	s2 := obj2.(*v1.Namespace)
 | 
						|
 | 
						|
	if s2.ObjectMeta.Labels[v1.LabelMetadataName] != theNs {
 | 
						|
		t.Errorf("Expected default namespace label value of %v, but got %v", theNs, s2.ObjectMeta.Labels[v1.LabelMetadataName])
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultPodSpecHostNetwork(t *testing.T) {
 | 
						|
	portNum := int32(8080)
 | 
						|
	s := v1.PodSpec{}
 | 
						|
	s.HostNetwork = true
 | 
						|
	s.Containers = []v1.Container{
 | 
						|
		{
 | 
						|
			Ports: []v1.ContainerPort{
 | 
						|
				{
 | 
						|
					ContainerPort: portNum,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	s.InitContainers = []v1.Container{
 | 
						|
		{
 | 
						|
			Ports: []v1.ContainerPort{
 | 
						|
				{
 | 
						|
					ContainerPort: portNum,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	pod := &v1.Pod{
 | 
						|
		Spec: s,
 | 
						|
	}
 | 
						|
	obj2 := roundTrip(t, runtime.Object(pod))
 | 
						|
	pod2 := obj2.(*v1.Pod)
 | 
						|
	s2 := pod2.Spec
 | 
						|
 | 
						|
	hostPortNum := s2.Containers[0].Ports[0].HostPort
 | 
						|
	if hostPortNum != portNum {
 | 
						|
		t.Errorf("Expected container port to be defaulted, was made %d instead of %d", hostPortNum, portNum)
 | 
						|
	}
 | 
						|
 | 
						|
	hostPortNum = s2.InitContainers[0].Ports[0].HostPort
 | 
						|
	if hostPortNum != portNum {
 | 
						|
		t.Errorf("Expected container port to be defaulted, was made %d instead of %d", hostPortNum, portNum)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultNodeStatusAllocatable(t *testing.T) {
 | 
						|
	capacity := v1.ResourceList{
 | 
						|
		v1.ResourceCPU:    resource.MustParse("1000m"),
 | 
						|
		v1.ResourceMemory: resource.MustParse("10G"),
 | 
						|
	}
 | 
						|
	allocatable := v1.ResourceList{
 | 
						|
		v1.ResourceCPU:    resource.MustParse("500m"),
 | 
						|
		v1.ResourceMemory: resource.MustParse("5G"),
 | 
						|
	}
 | 
						|
	tests := []struct {
 | 
						|
		capacity            v1.ResourceList
 | 
						|
		allocatable         v1.ResourceList
 | 
						|
		expectedAllocatable v1.ResourceList
 | 
						|
	}{{ // Everything set, no defaulting.
 | 
						|
		capacity:            capacity,
 | 
						|
		allocatable:         allocatable,
 | 
						|
		expectedAllocatable: allocatable,
 | 
						|
	}, { // Allocatable set, no defaulting.
 | 
						|
		capacity:            nil,
 | 
						|
		allocatable:         allocatable,
 | 
						|
		expectedAllocatable: allocatable,
 | 
						|
	}, { // Capacity set, allocatable defaults to capacity.
 | 
						|
		capacity:            capacity,
 | 
						|
		allocatable:         nil,
 | 
						|
		expectedAllocatable: capacity,
 | 
						|
	}, { // Nothing set, allocatable "defaults" to capacity.
 | 
						|
		capacity:            nil,
 | 
						|
		allocatable:         nil,
 | 
						|
		expectedAllocatable: nil,
 | 
						|
	}}
 | 
						|
 | 
						|
	copyResourceList := func(rl v1.ResourceList) v1.ResourceList {
 | 
						|
		if rl == nil {
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
		copy := make(v1.ResourceList, len(rl))
 | 
						|
		for k, v := range rl {
 | 
						|
			copy[k] = v.DeepCopy()
 | 
						|
		}
 | 
						|
		return copy
 | 
						|
	}
 | 
						|
 | 
						|
	resourceListsEqual := func(a v1.ResourceList, b v1.ResourceList) bool {
 | 
						|
		if len(a) != len(b) {
 | 
						|
			return false
 | 
						|
		}
 | 
						|
		for k, v := range a {
 | 
						|
			vb, found := b[k]
 | 
						|
			if !found {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
			if v.Cmp(vb) != 0 {
 | 
						|
				return false
 | 
						|
			}
 | 
						|
		}
 | 
						|
		return true
 | 
						|
	}
 | 
						|
 | 
						|
	for i, testcase := range tests {
 | 
						|
		node := v1.Node{
 | 
						|
			Status: v1.NodeStatus{
 | 
						|
				Capacity:    copyResourceList(testcase.capacity),
 | 
						|
				Allocatable: copyResourceList(testcase.allocatable),
 | 
						|
			},
 | 
						|
		}
 | 
						|
		node2 := roundTrip(t, runtime.Object(&node)).(*v1.Node)
 | 
						|
		actual := node2.Status.Allocatable
 | 
						|
		expected := testcase.expectedAllocatable
 | 
						|
		if !resourceListsEqual(expected, actual) {
 | 
						|
			t.Errorf("[%d] Expected v1.NodeStatus.Allocatable: %+v; Got: %+v", i, expected, actual)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultObjectFieldSelectorAPIVersion(t *testing.T) {
 | 
						|
	s := v1.PodSpec{
 | 
						|
		Containers: []v1.Container{
 | 
						|
			{
 | 
						|
				Env: []v1.EnvVar{
 | 
						|
					{
 | 
						|
						ValueFrom: &v1.EnvVarSource{
 | 
						|
							FieldRef: &v1.ObjectFieldSelector{},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	pod := &v1.Pod{
 | 
						|
		Spec: s,
 | 
						|
	}
 | 
						|
	obj2 := roundTrip(t, runtime.Object(pod))
 | 
						|
	pod2 := obj2.(*v1.Pod)
 | 
						|
	s2 := pod2.Spec
 | 
						|
 | 
						|
	apiVersion := s2.Containers[0].Env[0].ValueFrom.FieldRef.APIVersion
 | 
						|
	if apiVersion != "v1" {
 | 
						|
		t.Errorf("Expected default APIVersion v1, got: %v", apiVersion)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetMinimumScalePod(t *testing.T) {
 | 
						|
	// verify we default if limits are specified (and that request=0 is preserved)
 | 
						|
	s := v1.PodSpec{}
 | 
						|
	s.Containers = []v1.Container{
 | 
						|
		{
 | 
						|
			Resources: v1.ResourceRequirements{
 | 
						|
				Requests: v1.ResourceList{
 | 
						|
					v1.ResourceMemory: resource.MustParse("1n"),
 | 
						|
				},
 | 
						|
				Limits: v1.ResourceList{
 | 
						|
					v1.ResourceCPU: resource.MustParse("2n"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	s.InitContainers = []v1.Container{
 | 
						|
		{
 | 
						|
			Resources: v1.ResourceRequirements{
 | 
						|
				Requests: v1.ResourceList{
 | 
						|
					v1.ResourceMemory: resource.MustParse("1n"),
 | 
						|
				},
 | 
						|
				Limits: v1.ResourceList{
 | 
						|
					v1.ResourceCPU: resource.MustParse("2n"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	pod := &v1.Pod{
 | 
						|
		Spec: s,
 | 
						|
	}
 | 
						|
	corev1.SetObjectDefaults_Pod(pod)
 | 
						|
 | 
						|
	if expect := resource.MustParse("1m"); expect.Cmp(pod.Spec.Containers[0].Resources.Requests[v1.ResourceMemory]) != 0 {
 | 
						|
		t.Errorf("did not round resources: %#v", pod.Spec.Containers[0].Resources)
 | 
						|
	}
 | 
						|
	if expect := resource.MustParse("1m"); expect.Cmp(pod.Spec.InitContainers[0].Resources.Requests[v1.ResourceMemory]) != 0 {
 | 
						|
		t.Errorf("did not round resources: %#v", pod.Spec.InitContainers[0].Resources)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultRequestsPod(t *testing.T) {
 | 
						|
	// verify we default if limits are specified (and that request=0 is preserved)
 | 
						|
	s := v1.PodSpec{}
 | 
						|
	s.Containers = []v1.Container{
 | 
						|
		{
 | 
						|
			Resources: v1.ResourceRequirements{
 | 
						|
				Requests: v1.ResourceList{
 | 
						|
					v1.ResourceMemory: resource.MustParse("0"),
 | 
						|
				},
 | 
						|
				Limits: v1.ResourceList{
 | 
						|
					v1.ResourceCPU:    resource.MustParse("100m"),
 | 
						|
					v1.ResourceMemory: resource.MustParse("1Gi"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	s.InitContainers = []v1.Container{
 | 
						|
		{
 | 
						|
			Resources: v1.ResourceRequirements{
 | 
						|
				Requests: v1.ResourceList{
 | 
						|
					v1.ResourceMemory: resource.MustParse("0"),
 | 
						|
				},
 | 
						|
				Limits: v1.ResourceList{
 | 
						|
					v1.ResourceCPU:    resource.MustParse("100m"),
 | 
						|
					v1.ResourceMemory: resource.MustParse("1Gi"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	pod := &v1.Pod{
 | 
						|
		Spec: s,
 | 
						|
	}
 | 
						|
	output := roundTrip(t, runtime.Object(pod))
 | 
						|
	pod2 := output.(*v1.Pod)
 | 
						|
	defaultRequest := pod2.Spec.Containers[0].Resources.Requests
 | 
						|
	if requestValue := defaultRequest[v1.ResourceCPU]; requestValue.String() != "100m" {
 | 
						|
		t.Errorf("Expected request cpu: %s, got: %s", "100m", requestValue.String())
 | 
						|
	}
 | 
						|
	if requestValue := defaultRequest[v1.ResourceMemory]; requestValue.String() != "0" {
 | 
						|
		t.Errorf("Expected request memory: %s, got: %s", "0", requestValue.String())
 | 
						|
	}
 | 
						|
	defaultRequest = pod2.Spec.InitContainers[0].Resources.Requests
 | 
						|
	if requestValue := defaultRequest[v1.ResourceCPU]; requestValue.String() != "100m" {
 | 
						|
		t.Errorf("Expected request cpu: %s, got: %s", "100m", requestValue.String())
 | 
						|
	}
 | 
						|
	if requestValue := defaultRequest[v1.ResourceMemory]; requestValue.String() != "0" {
 | 
						|
		t.Errorf("Expected request memory: %s, got: %s", "0", requestValue.String())
 | 
						|
	}
 | 
						|
 | 
						|
	// verify we do nothing if no limits are specified
 | 
						|
	s = v1.PodSpec{}
 | 
						|
	s.Containers = []v1.Container{{}}
 | 
						|
	s.InitContainers = []v1.Container{{}}
 | 
						|
	pod = &v1.Pod{
 | 
						|
		Spec: s,
 | 
						|
	}
 | 
						|
	output = roundTrip(t, runtime.Object(pod))
 | 
						|
	pod2 = output.(*v1.Pod)
 | 
						|
	defaultRequest = pod2.Spec.Containers[0].Resources.Requests
 | 
						|
	if requestValue := defaultRequest[v1.ResourceCPU]; requestValue.String() != "0" {
 | 
						|
		t.Errorf("Expected 0 request value, got: %s", requestValue.String())
 | 
						|
	}
 | 
						|
	defaultRequest = pod2.Spec.InitContainers[0].Resources.Requests
 | 
						|
	if requestValue := defaultRequest[v1.ResourceCPU]; requestValue.String() != "0" {
 | 
						|
		t.Errorf("Expected 0 request value, got: %s", requestValue.String())
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestDefaultRequestIsNotSetForReplicationController(t *testing.T) {
 | 
						|
	s := v1.PodSpec{}
 | 
						|
	s.Containers = []v1.Container{
 | 
						|
		{
 | 
						|
			Resources: v1.ResourceRequirements{
 | 
						|
				Limits: v1.ResourceList{
 | 
						|
					v1.ResourceCPU: resource.MustParse("100m"),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	rc := &v1.ReplicationController{
 | 
						|
		Spec: v1.ReplicationControllerSpec{
 | 
						|
			Replicas: utilpointer.Int32(3),
 | 
						|
			Template: &v1.PodTemplateSpec{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Labels: map[string]string{
 | 
						|
						"foo": "bar",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: s,
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	output := roundTrip(t, runtime.Object(rc))
 | 
						|
	rc2 := output.(*v1.ReplicationController)
 | 
						|
	defaultRequest := rc2.Spec.Template.Spec.Containers[0].Resources.Requests
 | 
						|
	requestValue := defaultRequest[v1.ResourceCPU]
 | 
						|
	if requestValue.String() != "0" {
 | 
						|
		t.Errorf("Expected 0 request value, got: %s", requestValue.String())
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultLimitRangeItem(t *testing.T) {
 | 
						|
	limitRange := &v1.LimitRange{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name: "test-defaults",
 | 
						|
		},
 | 
						|
		Spec: v1.LimitRangeSpec{
 | 
						|
			Limits: []v1.LimitRangeItem{{
 | 
						|
				Type: v1.LimitTypeContainer,
 | 
						|
				Max: v1.ResourceList{
 | 
						|
					v1.ResourceCPU: resource.MustParse("100m"),
 | 
						|
				},
 | 
						|
				Min: v1.ResourceList{
 | 
						|
					v1.ResourceMemory: resource.MustParse("100Mi"),
 | 
						|
				},
 | 
						|
				Default:        v1.ResourceList{},
 | 
						|
				DefaultRequest: v1.ResourceList{},
 | 
						|
			}},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	output := roundTrip(t, runtime.Object(limitRange))
 | 
						|
	limitRange2 := output.(*v1.LimitRange)
 | 
						|
	defaultLimit := limitRange2.Spec.Limits[0].Default
 | 
						|
	defaultRequest := limitRange2.Spec.Limits[0].DefaultRequest
 | 
						|
 | 
						|
	// verify that default cpu was set to the max
 | 
						|
	defaultValue := defaultLimit[v1.ResourceCPU]
 | 
						|
	if defaultValue.String() != "100m" {
 | 
						|
		t.Errorf("Expected default cpu: %s, got: %s", "100m", defaultValue.String())
 | 
						|
	}
 | 
						|
	// verify that default request was set to the limit
 | 
						|
	requestValue := defaultRequest[v1.ResourceCPU]
 | 
						|
	if requestValue.String() != "100m" {
 | 
						|
		t.Errorf("Expected request cpu: %s, got: %s", "100m", requestValue.String())
 | 
						|
	}
 | 
						|
	// verify that if a min is provided, it will be the default if no limit is specified
 | 
						|
	requestMinValue := defaultRequest[v1.ResourceMemory]
 | 
						|
	if requestMinValue.String() != "100Mi" {
 | 
						|
		t.Errorf("Expected request memory: %s, got: %s", "100Mi", requestMinValue.String())
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultProbe(t *testing.T) {
 | 
						|
	originalProbe := v1.Probe{}
 | 
						|
	expectedProbe := v1.Probe{
 | 
						|
		InitialDelaySeconds: 0,
 | 
						|
		TimeoutSeconds:      1,
 | 
						|
		PeriodSeconds:       10,
 | 
						|
		SuccessThreshold:    1,
 | 
						|
		FailureThreshold:    3,
 | 
						|
	}
 | 
						|
 | 
						|
	pod := &v1.Pod{
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			Containers: []v1.Container{{LivenessProbe: &originalProbe}},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	output := roundTrip(t, runtime.Object(pod)).(*v1.Pod)
 | 
						|
	actualProbe := *output.Spec.Containers[0].LivenessProbe
 | 
						|
	if actualProbe != expectedProbe {
 | 
						|
		t.Errorf("Expected probe: %+v\ngot: %+v\n", expectedProbe, actualProbe)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultSchedulerName(t *testing.T) {
 | 
						|
	pod := &v1.Pod{}
 | 
						|
 | 
						|
	output := roundTrip(t, runtime.Object(pod)).(*v1.Pod)
 | 
						|
	if output.Spec.SchedulerName != v1.DefaultSchedulerName {
 | 
						|
		t.Errorf("Expected scheduler name: %+v\ngot: %+v\n", v1.DefaultSchedulerName, output.Spec.SchedulerName)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultHostPathVolumeSource(t *testing.T) {
 | 
						|
	s := v1.PodSpec{}
 | 
						|
	s.Volumes = []v1.Volume{
 | 
						|
		{
 | 
						|
			VolumeSource: v1.VolumeSource{
 | 
						|
				HostPath: &v1.HostPathVolumeSource{Path: "foo"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	pod := &v1.Pod{
 | 
						|
		Spec: s,
 | 
						|
	}
 | 
						|
	output := roundTrip(t, runtime.Object(pod))
 | 
						|
	pod2 := output.(*v1.Pod)
 | 
						|
	defaultType := pod2.Spec.Volumes[0].VolumeSource.HostPath.Type
 | 
						|
	expectedType := v1.HostPathUnset
 | 
						|
 | 
						|
	if defaultType == nil || *defaultType != expectedType {
 | 
						|
		t.Errorf("Expected v1.HostPathVolumeSource default type %v, got %v", expectedType, defaultType)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultEnableServiceLinks(t *testing.T) {
 | 
						|
	pod := &v1.Pod{}
 | 
						|
	output := roundTrip(t, runtime.Object(pod)).(*v1.Pod)
 | 
						|
	if output.Spec.EnableServiceLinks == nil || *output.Spec.EnableServiceLinks != v1.DefaultEnableServiceLinks {
 | 
						|
		t.Errorf("Expected enableServiceLinks value: %+v\ngot: %+v\n", v1.DefaultEnableServiceLinks, *output.Spec.EnableServiceLinks)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultServiceInternalTrafficPolicy(t *testing.T) {
 | 
						|
	cluster := v1.ServiceInternalTrafficPolicyCluster
 | 
						|
	local := v1.ServiceInternalTrafficPolicyLocal
 | 
						|
	testCases := []struct {
 | 
						|
		name                          string
 | 
						|
		expectedInternalTrafficPolicy *v1.ServiceInternalTrafficPolicy
 | 
						|
		svc                           v1.Service
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			name:                          "must set default internalTrafficPolicy",
 | 
						|
			expectedInternalTrafficPolicy: &cluster,
 | 
						|
			svc:                           v1.Service{},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                          "must not set default internalTrafficPolicy when it's cluster",
 | 
						|
			expectedInternalTrafficPolicy: &cluster,
 | 
						|
			svc: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					InternalTrafficPolicy: &cluster,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                          "must not set default internalTrafficPolicy when type is ExternalName",
 | 
						|
			expectedInternalTrafficPolicy: nil,
 | 
						|
			svc: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					Type: v1.ServiceTypeExternalName,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			name:                          "must not set default internalTrafficPolicy when it's local",
 | 
						|
			expectedInternalTrafficPolicy: &local,
 | 
						|
			svc: v1.Service{
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					InternalTrafficPolicy: &local,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, test := range testCases {
 | 
						|
		t.Run(test.name, func(t *testing.T) {
 | 
						|
			obj := roundTrip(t, runtime.Object(&test.svc))
 | 
						|
			svc := obj.(*v1.Service)
 | 
						|
 | 
						|
			if !reflect.DeepEqual(svc.Spec.InternalTrafficPolicy, test.expectedInternalTrafficPolicy) {
 | 
						|
				t.Errorf("expected .spec.internalTrafficPolicy: %v got %v", test.expectedInternalTrafficPolicy, svc.Spec.InternalTrafficPolicy)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaultResizePolicy(t *testing.T) {
 | 
						|
	// verify we default to NotRequired restart policy for resize when resources are specified
 | 
						|
	featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.InPlacePodVerticalScaling, true)
 | 
						|
 | 
						|
	for desc, tc := range map[string]struct {
 | 
						|
		testContainer        v1.Container
 | 
						|
		expectedResizePolicy []v1.ContainerResizePolicy
 | 
						|
	}{
 | 
						|
		"CPU and memory limits are specified": {
 | 
						|
			testContainer: v1.Container{
 | 
						|
				Resources: v1.ResourceRequirements{
 | 
						|
					Limits: v1.ResourceList{
 | 
						|
						v1.ResourceCPU:    resource.MustParse("100m"),
 | 
						|
						v1.ResourceMemory: resource.MustParse("200Mi"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceCPU,
 | 
						|
					RestartPolicy: v1.NotRequired,
 | 
						|
				},
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceMemory,
 | 
						|
					RestartPolicy: v1.NotRequired,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"CPU requests are specified": {
 | 
						|
			testContainer: v1.Container{
 | 
						|
				Resources: v1.ResourceRequirements{
 | 
						|
					Requests: v1.ResourceList{
 | 
						|
						v1.ResourceCPU: resource.MustParse("100m"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceCPU,
 | 
						|
					RestartPolicy: v1.NotRequired,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"Memory limits are specified": {
 | 
						|
			testContainer: v1.Container{
 | 
						|
				Resources: v1.ResourceRequirements{
 | 
						|
					Limits: v1.ResourceList{
 | 
						|
						v1.ResourceMemory: resource.MustParse("200Mi"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceMemory,
 | 
						|
					RestartPolicy: v1.NotRequired,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"No resources are specified": {
 | 
						|
			testContainer:        v1.Container{Name: "besteffort"},
 | 
						|
			expectedResizePolicy: nil,
 | 
						|
		},
 | 
						|
		"CPU and memory limits are specified with restartContainer resize policy for memory": {
 | 
						|
			testContainer: v1.Container{
 | 
						|
				Resources: v1.ResourceRequirements{
 | 
						|
					Limits: v1.ResourceList{
 | 
						|
						v1.ResourceCPU:    resource.MustParse("100m"),
 | 
						|
						v1.ResourceMemory: resource.MustParse("200Mi"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				ResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
					{
 | 
						|
						ResourceName:  v1.ResourceMemory,
 | 
						|
						RestartPolicy: v1.RestartContainer,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceMemory,
 | 
						|
					RestartPolicy: v1.RestartContainer,
 | 
						|
				},
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceCPU,
 | 
						|
					RestartPolicy: v1.NotRequired,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"CPU requests and memory limits are specified with restartContainer resize policy for CPU": {
 | 
						|
			testContainer: v1.Container{
 | 
						|
				Resources: v1.ResourceRequirements{
 | 
						|
					Limits: v1.ResourceList{
 | 
						|
						v1.ResourceMemory: resource.MustParse("200Mi"),
 | 
						|
					},
 | 
						|
					Requests: v1.ResourceList{
 | 
						|
						v1.ResourceCPU: resource.MustParse("100m"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				ResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
					{
 | 
						|
						ResourceName:  v1.ResourceCPU,
 | 
						|
						RestartPolicy: v1.RestartContainer,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceCPU,
 | 
						|
					RestartPolicy: v1.RestartContainer,
 | 
						|
				},
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceMemory,
 | 
						|
					RestartPolicy: v1.NotRequired,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"CPU and memory requests are specified with restartContainer resize policy for both": {
 | 
						|
			testContainer: v1.Container{
 | 
						|
				Resources: v1.ResourceRequirements{
 | 
						|
					Requests: v1.ResourceList{
 | 
						|
						v1.ResourceCPU:    resource.MustParse("100m"),
 | 
						|
						v1.ResourceMemory: resource.MustParse("200Mi"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				ResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
					{
 | 
						|
						ResourceName:  v1.ResourceCPU,
 | 
						|
						RestartPolicy: v1.RestartContainer,
 | 
						|
					},
 | 
						|
					{
 | 
						|
						ResourceName:  v1.ResourceMemory,
 | 
						|
						RestartPolicy: v1.RestartContainer,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceCPU,
 | 
						|
					RestartPolicy: v1.RestartContainer,
 | 
						|
				},
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceMemory,
 | 
						|
					RestartPolicy: v1.RestartContainer,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"Ephemeral storage limits are specified": {
 | 
						|
			testContainer: v1.Container{
 | 
						|
				Resources: v1.ResourceRequirements{
 | 
						|
					Limits: v1.ResourceList{
 | 
						|
						v1.ResourceEphemeralStorage: resource.MustParse("500Mi"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedResizePolicy: nil,
 | 
						|
		},
 | 
						|
		"Ephemeral storage requests and CPU limits are specified": {
 | 
						|
			testContainer: v1.Container{
 | 
						|
				Resources: v1.ResourceRequirements{
 | 
						|
					Limits: v1.ResourceList{
 | 
						|
						v1.ResourceCPU: resource.MustParse("100m"),
 | 
						|
					},
 | 
						|
					Requests: v1.ResourceList{
 | 
						|
						v1.ResourceEphemeralStorage: resource.MustParse("500Mi"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceCPU,
 | 
						|
					RestartPolicy: v1.NotRequired,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		"Ephemeral storage requests and limits, memory requests with restartContainer policy are specified": {
 | 
						|
			testContainer: v1.Container{
 | 
						|
				Resources: v1.ResourceRequirements{
 | 
						|
					Limits: v1.ResourceList{
 | 
						|
						v1.ResourceEphemeralStorage: resource.MustParse("500Mi"),
 | 
						|
					},
 | 
						|
					Requests: v1.ResourceList{
 | 
						|
						v1.ResourceEphemeralStorage: resource.MustParse("500Mi"),
 | 
						|
						v1.ResourceMemory:           resource.MustParse("200Mi"),
 | 
						|
					},
 | 
						|
				},
 | 
						|
				ResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
					{
 | 
						|
						ResourceName:  v1.ResourceMemory,
 | 
						|
						RestartPolicy: v1.RestartContainer,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			expectedResizePolicy: []v1.ContainerResizePolicy{
 | 
						|
				{
 | 
						|
					ResourceName:  v1.ResourceMemory,
 | 
						|
					RestartPolicy: v1.RestartContainer,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	} {
 | 
						|
		t.Run(desc, func(t *testing.T) {
 | 
						|
			testPod := v1.Pod{}
 | 
						|
			testPod.Spec.Containers = append(testPod.Spec.Containers, tc.testContainer)
 | 
						|
			output := roundTrip(t, runtime.Object(&testPod))
 | 
						|
			pod2 := output.(*v1.Pod)
 | 
						|
			if !cmp.Equal(pod2.Spec.Containers[0].ResizePolicy, tc.expectedResizePolicy) {
 | 
						|
				t.Errorf("expected resize policy %+v, but got %+v", tc.expectedResizePolicy, pod2.Spec.Containers[0].ResizePolicy)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestSetDefaults_Volume(t *testing.T) {
 | 
						|
	featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.ImageVolume, true)
 | 
						|
	for desc, tc := range map[string]struct {
 | 
						|
		given, expected *v1.Volume
 | 
						|
	}{
 | 
						|
		"defaults to emptyDir": {
 | 
						|
			given:    &v1.Volume{},
 | 
						|
			expected: &v1.Volume{VolumeSource: v1.VolumeSource{EmptyDir: &v1.EmptyDirVolumeSource{}}},
 | 
						|
		},
 | 
						|
		"default image volume source pull policy is IfNotPresent": {
 | 
						|
			given:    &v1.Volume{VolumeSource: v1.VolumeSource{Image: &v1.ImageVolumeSource{Reference: "image:v1"}}},
 | 
						|
			expected: &v1.Volume{VolumeSource: v1.VolumeSource{Image: &v1.ImageVolumeSource{Reference: "image:v1", PullPolicy: v1.PullIfNotPresent}}},
 | 
						|
		},
 | 
						|
		"default image volume source pull policy Always if 'latest' tag is used": {
 | 
						|
			given:    &v1.Volume{VolumeSource: v1.VolumeSource{Image: &v1.ImageVolumeSource{Reference: "image:latest"}}},
 | 
						|
			expected: &v1.Volume{VolumeSource: v1.VolumeSource{Image: &v1.ImageVolumeSource{Reference: "image:latest", PullPolicy: v1.PullAlways}}},
 | 
						|
		},
 | 
						|
		"default image volume source pull policy Always if no tag is used": {
 | 
						|
			given:    &v1.Volume{VolumeSource: v1.VolumeSource{Image: &v1.ImageVolumeSource{Reference: "image"}}},
 | 
						|
			expected: &v1.Volume{VolumeSource: v1.VolumeSource{Image: &v1.ImageVolumeSource{Reference: "image", PullPolicy: v1.PullAlways}}},
 | 
						|
		},
 | 
						|
	} {
 | 
						|
		t.Run(desc, func(t *testing.T) {
 | 
						|
			corev1.SetDefaults_Volume(tc.given)
 | 
						|
			if !cmp.Equal(tc.given, tc.expected) {
 | 
						|
				t.Errorf("expected volume %+v, but got %+v", tc.expected, tc.given)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 |